Literature Database

Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense

Authors: Jay N. Paranjape, Rahul Kumar Dubey, Vijendran V Gopalan | Published: 2020-06-02
Poisoning
Attack Type
Defense Effectiveness Analysis

Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods

Authors: Kyungmi Lee, Anantha P. Chandrakasan | Published: 2020-06-01
Poisoning
Adversarial Attack Detection
Defense Effectiveness Analysis

DarKnight: A Data Privacy Scheme for Training and Inference of Deep Neural Networks

Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2020-06-01 | Updated: 2020-10-15
Data Protection Method
Privacy Assessment
Computational Consistency

Pruning via Iterative Ranking of Sensitivity Statistics

Authors: Stijn Verdenius, Maarten Stol, Patrick Forré | Published: 2020-06-01 | Updated: 2020-06-14
Algorithm
Sparse Model
Fundamentals of Machine Learning

Adversarial Attacks on Reinforcement Learning based Energy Management Systems of Extended Range Electric Delivery Vehicles

Authors: Pengyue Wang, Yan Li, Shashi Shekhar, William F. Northrop | Published: 2020-06-01
Energy Management
Adversarial Attack Detection
Deep Reinforcement Learning

Evaluations and Methods for Explanation through Robustness Analysis

Authors: Cheng-Yu Hsieh, Chih-Kuan Yeh, Xuanqing Liu, Pradeep Ravikumar, Seungyeon Kim, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2020-05-31 | Updated: 2021-04-08
Future Research
Feature Importance Analysis
Interpretation Method

Algorithm Selection Framework for Cyber Attack Detection

Authors: Marc Chalé, Nathaniel D. Bastian, Jeffery Weir | Published: 2020-05-28
Algorithm
Network Threat Detection
Feature Selection Method

QEBA: Query-Efficient Boundary-Based Blackbox Attack

Authors: Huichen Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, Bo Li | Published: 2020-05-28
Adversarial Attack Methods
Privacy Protection in Machine Learning
Dimensionality Reduction Method

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms

Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28
Data Protection Method
Privacy Assessment
Adversarial Attack Methods

Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users

Authors: Ferenc Béres, István András Seres, András A. Benczúr, Mikerah Quintyne-Collins | Published: 2020-05-28 | Updated: 2020-10-13
Transaction Prioritization
Privacy Assessment
Fraudulent Transaction