Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway Authors: Veronica del Carmen Estrada | Published: 2017-06-10 TCP Session ManagementData CollectionAnomaly Detection Algorithm 2017.06.10 2025.05.28 Literature Database
Certified Defenses for Data Poisoning Attacks Authors: Jacob Steinhardt, Pang Wei Koh, Percy Liang | Published: 2017-06-09 | Updated: 2017-11-24 PoisoningOptimization ProblemDetection of Poisonous Data 2017.06.09 2025.05.28 Literature Database
A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization Authors: Jeffrey Pawlick, Quanyan Zhu | Published: 2017-06-08 | Updated: 2017-10-16 Privacy Protection MechanismPrivacy IssuesDifferential Privacy 2017.06.08 2025.05.28 Literature Database
Localization of JPEG double compression through multi-domain convolutional neural networks Authors: Irene Amerini, Tiberio Uricchio, Lamberto Ballan, Roberto Caldelli | Published: 2017-06-06 Data Flow AnalysisModel ArchitectureImage Forensics 2017.06.06 2025.05.28 Literature Database
Adversarial-Playground: A Visualization Suite for Adversarial Sample Generation Authors: Andrew Norton, Yanjun Qi | Published: 2017-06-06 | Updated: 2017-06-16 Certified RobustnessAttack TypeAdversarial Learning 2017.06.06 2025.05.28 Literature Database
Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version) Authors: Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu | Published: 2017-06-03 | Updated: 2017-07-06 Online LearningPrivacy IssuesFeature Selection 2017.06.03 2025.05.28 Literature Database
MagNet: a Two-Pronged Defense against Adversarial Examples Authors: Dongyu Meng, Hao Chen | Published: 2017-05-25 | Updated: 2017-09-11 Attack TypeAdversarial Example DetectionEffectiveness Analysis of Defense Methods 2017.05.25 2025.05.28 Literature Database
Detecting Malignant TLS Servers Using Machine Learning Techniques Authors: Sankalp Bagaria, R. Balaji, B. S. Bindhumadhava | Published: 2017-05-25 Protocol ProcedureMalicious ClientFeature Selection 2017.05.25 2025.05.28 Literature Database
Anti-spoofing Methods for Automatic SpeakerVerification System Authors: Galina Lavrentyeva, Sergey Novoselov, Konstantin Simonchik | Published: 2017-05-24 Detection of DeepfakesUnknown Attack DetectionSpeech Recognition System 2017.05.24 2025.05.28 Literature Database
Audio-replay attack detection countermeasures Authors: Galina Lavrentyeva, Sergey Novoselov, Egor Malykh, Alexander Kozlov, Oleg Kudashev, Vadim Shchemelinin | Published: 2017-05-24 Gaussian Mixture ModelModel ArchitectureSpeech Recognition System 2017.05.24 2025.05.28 Literature Database