Literature Database

Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities

Authors: Shuhan Yuan, Xintao Wu | Published: 2020-05-25
Machine Learning
Machine Learning Technology
Threat Model

Keyed Non-Parametric Hypothesis Tests

Authors: Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache | Published: 2020-05-25
Poisoning
Adversarial attack
Machine Learning Technology

Adversarial Feature Selection against Evasion Attacks

Authors: Fei Zhang, Patrick P. K. Chan, Battista Biggio, Daniel S. Yeung, Fabio Roli | Published: 2020-05-25
Poisoning
Adversarial attack
Feature Extraction Method

Malware Detection at the Microarchitecture Level using Machine Learning Techniques

Authors: Abigail Kwan | Published: 2020-05-25
Machine Learning
Machine Learning Technology
Feature Extraction Method

Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification

Authors: Sina Däubener, Lea Schönherr, Asja Fischer, Dorothea Kolossa | Published: 2020-05-24 | Updated: 2020-08-02
Poisoning
Quantification of Uncertainty
Adversarial Example Detection

Adversarial Attack on Hierarchical Graph Pooling Neural Networks

Authors: Haoteng Tang, Guixiang Ma, Yurong Chen, Lei Guo, Wei Wang, Bo Zeng, Liang Zhan | Published: 2020-05-23
Poisoning
Adversarial Example
Adversarial attack

TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations

Authors: Ang Li, Yixiao Duan, Huanrui Yang, Yiran Chen, Jianlei Yang | Published: 2020-05-23 | Updated: 2020-08-25
Data Protection Method
Privacy Assessment
Feature Extraction Method

Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks

Authors: Patrick Lewis, Ethan Perez, Aleksandra Piktus, Fabio Petroni, Vladimir Karpukhin, Naman Goyal, Heinrich Küttler, Mike Lewis, Wen-tau Yih, Tim Rocktäschel, Sebastian Riedel, Douwe Kiela | Published: 2020-05-22 | Updated: 2021-04-12
RAG
Information Extraction Method
Knowledge Extraction Method

An Adversarial Approach for Explaining the Predictions of Deep Neural Networks

Authors: Arash Rahnama, Andrew Tseng | Published: 2020-05-20 | Updated: 2020-09-28
Algorithm
Poisoning
Statistical Analysis

Graph Structure Learning for Robust Graph Neural Networks

Authors: Wei Jin, Yao Ma, Xiaorui Liu, Xianfeng Tang, Suhang Wang, Jiliang Tang | Published: 2020-05-20 | Updated: 2020-06-27
Algorithm
Graph Representation Learning
Optimization Strategy