Depth-2 Neural Networks Under a Data-Poisoning Attack Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29 2020.05.04 2025.05.28 Literature Database
Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware? Authors: Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2020-05-04 | Updated: 2021-05-27 2020.05.04 2025.05.28 Literature Database
Differentially Private Collaborative Intrusion Detection Systems For VANETs Authors: Tao Zhang, Quanyan Zhu | Published: 2020-05-02 2020.05.02 2025.05.28 Literature Database
Robust Deep Learning as Optimal Control: Insights and Convergence Guarantees Authors: Jacob H. Seidman, Mahyar Fazlyab, Victor M. Preciado, George J. Pappas | Published: 2020-05-01 2020.05.01 2025.05.28 Literature Database
Studying Ransomware Attacks Using Web Search Logs Authors: Chetan Bansal, Pantazis Deligiannis, Chandra Maddila, Nikitha Rao | Published: 2020-05-01 | Updated: 2020-05-23 2020.05.01 2025.05.28 Literature Database
Differentially Private Federated Learning with Laplacian Smoothing Authors: Zhicong Liang, Bao Wang, Quanquan Gu, Stanley Osher, Yuan Yao | Published: 2020-05-01 | Updated: 2021-09-10 2020.05.01 2025.05.28 Literature Database
Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna | Published: 2020-05-01 | Updated: 2021-03-14 2020.05.01 2025.05.28 Literature Database
Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness Authors: Pu Zhao, Pin-Yu Chen, Payel Das, Karthikeyan Natesan Ramamurthy, Xue Lin | Published: 2020-04-30 | Updated: 2020-07-03 2020.04.30 2025.05.28 Literature Database
Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29 2020.04.29 2025.05.28 Literature Database
Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph Authors: Amir Hossein Kargaran, Mohammad Sadegh Akhondzadeh, Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Kave Salamatian, Masoud Nejad Sattary | Published: 2020-04-29 | Updated: 2021-05-10 2020.04.29 2025.05.28 Literature Database