Literature Database

Minority Reports Defense: Defending Against Adversarial Patches

Authors: Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David Wagner | Published: 2020-04-28
Attack Detection
Adversarial Attack Detection
Defense Effectiveness Analysis

Adversarial Learning Guarantees for Linear Hypotheses and Neural Networks

Authors: Pranjal Awasthi, Natalie Frank, Mehryar Mohri | Published: 2020-04-28
Robustness Improvement Method
Formal Verification
Adversarial Attack Detection

Private Dataset Generation Using Privacy Preserving Collaborative Learning

Authors: Amit Chaulwar | Published: 2020-04-28
Privacy Protection
Membership Inference
Federated Learning System

Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks

Authors: Alex Habeen Chang, Benjamin M. Case | Published: 2020-04-28 | Updated: 2020-04-29
Algorithm
Attack Pattern Extraction
Encryption Method

Data-Driven Model-Based Analysis of the Ethereum Verifier’s Dilemma

Authors: Maher Alharby, Roben Castagna Lunardi, Amjad Aldweesh, Aad van Moorsel | Published: 2020-04-27
Simulation Result Evaluation
Blockchain Technology
Statistical Methods

Transferable Perturbations of Deep Feature Distributions

Authors: Nathan Inkawhich, Kevin J Liang, Lawrence Carin, Yiran Chen | Published: 2020-04-27
Multi-Class Classification
Adversarial Attack Methods
Deep Learning Technology

Printing and Scanning Attack for Image Counter Forensics

Authors: Hailey Joren, Otkrist Gupta, Dan Raviv | Published: 2020-04-27 | Updated: 2020-06-24
Algorithm
Image Feature Extraction
Vulnerability detection

Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks

Authors: Kang Liu, Benjamin Tan, Gaurav Rajavendra Reddy, Siddharth Garg, Yiorgos Makris, Ramesh Karri | Published: 2020-04-26
Poisoning
Deep Learning Technology
Effectiveness Analysis of Defense Methods

Improved Image Wasserstein Attacks and Defenses

Authors: Edward J. Hu, Adith Swaminathan, Hadi Salman, Greg Yang | Published: 2020-04-26 | Updated: 2023-05-09
Robustness Analysis
Adversarial Example
Adversarial Attack Methods

Privacy in Deep Learning: A Survey

Authors: Fatemehsadat Mireshghallah, Mohammadkazem Taram, Praneeth Vepakomma, Abhishek Singh, Ramesh Raskar, Hadi Esmaeilzadeh | Published: 2020-04-25 | Updated: 2020-11-07
Privacy Enhancing Technology
Membership Inference
Deep Learning Technology