Literature Database

Adversarial Robustness with Non-uniform Perturbations

Authors: Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore | Published: 2021-02-24 | Updated: 2021-10-29
Malware Detection Method
Adversarial Example
Adversarial Example Detection

Learner-Private Convex Optimization

Authors: Jiaming Xu, Kuang Xu, Dana Yang | Published: 2021-02-23 | Updated: 2021-10-23
Data Collection
Data Generation
Bayesian Classification

Resilience of Bayesian Layer-Wise Explanations under Adversarial Attacks

Authors: Ginevra Carbone, Guido Sanguinetti, Luca Bortolussi | Published: 2021-02-22 | Updated: 2022-05-05
Bayesian Classification
Poisoning
Adversarial Example

A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization

Authors: HanQin Cai, Yuchen Lou, Daniel McKenzie, Wotao Yin | Published: 2021-02-21 | Updated: 2021-06-11
Watermarking
Model Performance Evaluation
Signal Analysis

A flow-based IDS using Machine Learning in eBPF

Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2021-02-19 | Updated: 2022-03-04
ML-Based IDS
Watermarking
Attack Method

Bridging the Gap Between Adversarial Robustness and Optimization Bias

Authors: Fartash Faghri, Sven Gowal, Cristina Vasconcelos, David J. Fleet, Fabian Pedregosa, Nicolas Le Roux | Published: 2021-02-17 | Updated: 2021-06-07
Model Architecture
Adversarial Example
Adversarial Training

IoTDevID: A Behavior-Based Device Identification Method for the IoT

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2021-02-17 | Updated: 2022-07-19
Dataset evaluation
Data Collection
Model Performance Evaluation

ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves

Authors: Ali Burak Ünal, Nico Pfeifer, Mete Akgün | Published: 2021-02-17 | Updated: 2023-06-15
Watermarking
Data Protection Method
Model Performance Evaluation

Machine Learning Based Cyber Attacks Targeting on Controlled Information: A Survey

Authors: Yuantian Miao, Chao Chen, Lei Pan, Qing-Long Han, Jun Zhang, Yang Xiang | Published: 2021-02-16 | Updated: 2021-11-15
Data Protection Method
Data Collection
User Activity Analysis

SK-Tree: a systematic malware detection algorithm on streaming trees via the signature kernel

Authors: Thomas Cochrane, Peter Foster, Varun Chhabra, Maud Lemercier, Cristopher Salvi, Terry Lyons | Published: 2021-02-16 | Updated: 2021-09-29
Watermarking
Malware Detection Method
Hierarchical Classification Methods