Literature Database

Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?

Authors: Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2020-05-04 | Updated: 2021-05-27
Poisoning
Malware Classification
Adversarial Example

Differentially Private Collaborative Intrusion Detection Systems For VANETs

Authors: Tao Zhang, Quanyan Zhu | Published: 2020-05-02
Algorithm
Privacy Analysis
Privacy Assessment

Robust Deep Learning as Optimal Control: Insights and Convergence Guarantees

Authors: Jacob H. Seidman, Mahyar Fazlyab, Victor M. Preciado, George J. Pappas | Published: 2020-05-01
Algorithm
Adversarial Example
Optimization Strategy

Studying Ransomware Attacks Using Web Search Logs

Authors: Chetan Bansal, Pantazis Deligiannis, Chandra Maddila, Nikitha Rao | Published: 2020-05-01 | Updated: 2020-05-23
User Behavior Analysis
Ransomware Assessment
Information Gathering Methods

Differentially Private Federated Learning with Laplacian Smoothing

Authors: Zhicong Liang, Bao Wang, Quanquan Gu, Stanley Osher, Yuan Yao | Published: 2020-05-01 | Updated: 2021-09-10
Privacy Analysis
Privacy Assessment
Federated Learning System

Bullseye Polytope: A Scalable Clean-Label Poisoning Attack with Improved Transferability

Authors: Hojjat Aghakhani, Dongyu Meng, Yu-Xiang Wang, Christopher Kruegel, Giovanni Vigna | Published: 2020-05-01 | Updated: 2021-03-14
Backdoor Attack
Poisoning
Defense Effectiveness Analysis

Bridging Mode Connectivity in Loss Landscapes and Adversarial Robustness

Authors: Pu Zhao, Pin-Yu Chen, Payel Das, Karthikeyan Natesan Ramamurthy, Xue Lin | Published: 2020-04-30 | Updated: 2020-07-03
Backdoor Attack
Poisoning
Robustness Improvement Method

Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability

Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29
Algorithm
Adversarial Attack Detection
Role of Machine Learning

Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph

Authors: Amir Hossein Kargaran, Mohammad Sadegh Akhondzadeh, Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Kave Salamatian, Masoud Nejad Sattary | Published: 2020-04-29 | Updated: 2021-05-10
URL analysis techniques
Algorithm
Privacy Assessment

Dynamic Anomaly Detection with High-fidelity Simulators: A Convex Optimization Approach

Authors: Kaikai Pan, Peter Palensky, Peyman Mohajerin Esfahani | Published: 2020-04-29 | Updated: 2020-10-06
Energy Management
Robustness Improvement Method
Attack Detection