Literature Database

Adversarial attacks on neural networks through canonical Riemannian foliations

Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18
Robustness
Selection and Evaluation of Optimization Algorithms
Defense Method

PUMA: Performance Unchanged Model Augmentation for Training Data Removal

Authors: Ga Wu, Masoud Hashemi, Christopher Srinivasa | Published: 2022-03-02
Data Management System
Trade-off Analysis
Performance Evaluation Metrics

A Method Based on Deep Learning for the Detection and Characterization of Cybersecurity Incidents in Internet of Things Devices

Authors: Jhon Alexánder Parra, Sergio Armando Gutiérrez, John Willian Branch | Published: 2022-03-01
DoS Mitigation
Dataset Generation
Model Architecture

Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks

Authors: Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-01
Style Reconstruction Penalty
Model Architecture
Selection and Evaluation of Optimization Algorithms

Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles

Authors: Nidhi Rastogi, Sara Rampazzi, Michael Clifford, Miriam Heller, Matthew Bishop, Karl Levitt | Published: 2022-03-01
Dataset evaluation
Model Design and Accuracy
Vulnerabilities in Autonomous Driving Technology

Quantum Differential Privacy: An Information Theory Perspective

Authors: Christoph Hirche, Cambyse Rouzé, Daniel Stilck França | Published: 2022-02-22 | Updated: 2023-04-06
Privacy Protection
Privacy Protection Method
Quantum Computing

ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code

Authors: Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos | Published: 2022-02-21 | Updated: 2023-04-21
PLC Programming
Performance Evaluation
Machine Learning Framework

Toward More Generalized Malicious URL Detection Models

Authors: YunDa Tsai, Cayon Liow, Yin Sheng Siang, Shou-De Lin | Published: 2022-02-21 | Updated: 2024-02-09
Token Distribution Analysis
Bias
Impact of Generalization

Transferring Adversarial Robustness Through Robust Representation Matching

Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-02-21 | Updated: 2022-05-05
Poisoning
Robustness
Adaptive Adversarial Training

NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks

Authors: Haoyu Liu, Paul Patras | Published: 2022-02-20 | Updated: 2022-04-20
DDoS Attack
Intrusion Detection System
Attack Chain Analysis