A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks Authors: Huichen Li, Xiaojun Xu, Chang Liu, Teng Ren, Kun Wu, Xuezhi Cao, Weinan Zhang, Yong Yu, Dawn Song | Published: 2018-04-07 2018.04.07 2025.05.28 Literature Database
Fortified Networks: Improving the Robustness of Deep Networks by Modeling the Manifold of Hidden Representations Authors: Alex Lamb, Jonathan Binas, Anirudh Goyal, Dmitriy Serdyuk, Sandeep Subramanian, Ioannis Mitliagkas, Yoshua Bengio | Published: 2018-04-07 2018.04.07 2025.05.28 Literature Database
Poison Frogs! Targeted Clean-Label Poisoning Attacks on Neural Networks Authors: Ali Shafahi, W. Ronny Huang, Mahyar Najibi, Octavian Suciu, Christoph Studer, Tudor Dumitras, Tom Goldstein | Published: 2018-04-03 | Updated: 2018-11-10 2018.04.03 2025.05.28 Literature Database
Resilient Non-Submodular Maximization over Matroid Constraints Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-04-02 | Updated: 2018-12-06 2018.04.02 2025.05.28 Literature Database
Manipulating Machine Learning: Poisoning Attacks and Countermeasures for Regression Learning Authors: Matthew Jagielski, Alina Oprea, Battista Biggio, Chang Liu, Cristina Nita-Rotaru, Bo Li | Published: 2018-04-01 | Updated: 2021-09-28 2018.04.01 2025.05.28 Literature Database
Adversarial Attacks and Defences Competition Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio, Yinpeng Dong, Fangzhou Liao, Ming Liang, Tianyu Pang, Jun Zhu, Xiaolin Hu, Cihang Xie, Jianyu Wang, Zhishuai Zhang, Zhou Ren, Alan Yuille, Sangxia Huang, Yao Zhao, Yuzhe Zhao, Zhonglin Han, Junjiajia Long, Yerkebulan Berdibekov, Takuya Akiba, Seiya Tokui, Motoki Abe | Published: 2018-03-31 2018.03.31 2025.05.28 Literature Database
Two-Stream Neural Networks for Tampered Face Detection Authors: Peng Zhou, Xintong Han, Vlad I. Morariu, Larry S. Davis | Published: 2018-03-29 2018.03.29 2025.05.28 Literature Database
Protection against Cloning for Deep Learning Authors: Richard Kenway | Published: 2018-03-29 2018.03.29 2025.05.28 Literature Database
Defending against Adversarial Images using Basis Functions Transformations Authors: Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger | Published: 2018-03-28 | Updated: 2018-04-16 2018.03.28 2025.05.28 Literature Database
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14 2018.03.27 2025.05.28 Literature Database