Literature Database

Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets

Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04
Dataset Generation
Data Extraction and Analysis
Attack Method

Multi-Step Adversarial Perturbations on Recommender Systems Embeddings

Authors: Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra | Published: 2020-10-03
Robustness Evaluation
Adversarial Perturbation Techniques
Machine Learning Method

Do Wider Neural Networks Really Help Adversarial Robustness?

Authors: Boxi Wu, Jinghui Chen, Deng Cai, Xiaofei He, Quanquan Gu | Published: 2020-10-03 | Updated: 2021-08-14
Robustness Evaluation
Adversarial Example
Deep Learning Technology

CorrAttack: Black-box Adversarial Attack with Structured Search

Authors: Zhichao Huang, Yaowei Huang, Tong Zhang | Published: 2020-10-03
Robustness Evaluation
Deep Learning Method
Feature Selection Method

Query complexity of adversarial attacks

Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2020-10-02 | Updated: 2021-02-10
Robustness Evaluation
Deep Learning Method
Computational Complexity

An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood

Authors: Teddy Furon | Published: 2020-10-02 | Updated: 2022-05-20
Data Management System
Robustness Evaluation
Image Processing

Deep learning for time series classification

Authors: Hassan Ismail Fawaz | Published: 2020-10-01
Model Architecture
Adversarial Example
Deep Learning Method

Bag of Tricks for Adversarial Training

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2020-10-01 | Updated: 2021-03-31
Model Architecture
Robustness Improvement Method
Optimization Methods

Erratum Concerning the Obfuscated Gradients Attack on Stochastic Activation Pruning

Authors: Guneet S. Dhillon, Nicholas Carlini | Published: 2020-09-30
Watermarking
Robustness Improvement Method
Attack Evaluation

DVERGE: Diversifying Vulnerabilities for Enhanced Robust Generation of Ensembles

Authors: Huanrui Yang, Jingyang Zhang, Hongliang Dong, Nathan Inkawhich, Andrew Gardner, Andrew Touchet, Wesley Wilkes, Heath Berry, Hai Li | Published: 2020-09-30 | Updated: 2020-10-18
Robustness Improvement Method
Adversarial Example
Vulnerability Assessment Method