Literature Database

New Directions in Automated Traffic Analysis

Authors: Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal | Published: 2020-08-06 | Updated: 2021-10-19
Watermarking
Data Extraction and Analysis
Machine Learning

Data Minimization for GDPR Compliance in Machine Learning Models

Authors: Abigail Goldsteen, Gilad Ezov, Ron Shmelkin, Micha Moffie, Ariel Farkash | Published: 2020-08-06
Data Obfuscation
Data Extraction and Analysis
Role of Machine Learning

Training DNN Model with Secret Key for Model Protection

Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-08-06
Watermarking
Adversarial Learning
Machine Learning

Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection

Authors: MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami | Published: 2020-08-05
Attack Detection
Machine Learning
Anomaly Detection Method

Robust Deep Reinforcement Learning through Adversarial Loss

Authors: Tuomas Oikarinen, Wang Zhang, Alexandre Megretski, Luca Daniel, Tsui-Wei Weng | Published: 2020-08-05 | Updated: 2021-11-10
Poisoning
Reinforcement Learning
Adversarial Example

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence

Authors: Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip S. Yu | Published: 2020-08-05
Game Theory
Privacy Assessment
Machine Learning

TREND: Transferability based Robust ENsemble Design

Authors: Deepak Ravikumar, Sangamesh Kodge, Isha Garg, Kaushik Roy | Published: 2020-08-04 | Updated: 2021-03-30
Adversarial Example
Adversarial attack
Transfer Learning

Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers

Authors: Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz | Published: 2020-08-02
Data Extraction and Analysis
Privacy Assessment
Malfunction of Voice Assistants

Towards Class-Oriented Poisoning Attacks Against Neural Networks

Authors: Bingyin Zhao, Yingjie Lao | Published: 2020-07-31 | Updated: 2021-10-11
Backdoor Attack
Poisoning
Attack Method

Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-07-31
Poisoning
Attack Method
Deep Learning