How to compare adversarial robustness of classifiers from a global perspective Authors: Niklas Risse, Christina Göpfert, Jan Philip Göpfert | Published: 2020-04-22 | Updated: 2020-10-15 PoisoningRobustness AnalysisEvaluation Method 2020.04.22 2025.05.28 Literature Database
Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks Authors: William Aiken, Hyoungshick Kim, Simon Woo | Published: 2020-04-22 Attack MethodIntellectual Property ProtectionWatermark Removal Technology 2020.04.22 2025.05.28 Literature Database
Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection Authors: Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy | Published: 2020-04-22 Adversarial attackSelection and Evaluation of Optimization AlgorithmsAnomaly Detection Algorithm 2020.04.22 2025.05.28 Literature Database
Provably robust deep generative models Authors: Filipe Condessa, Zico Kolter | Published: 2020-04-22 Robustness Improvement MethodAdversarial attackDeep Learning Method 2020.04.22 2025.05.28 Literature Database
A Framework for Evaluating Gradient Leakage Attacks in Federated Learning Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2020-04-22 | Updated: 2020-04-23 Privacy Enhancing TechnologyPoisoningAttack Type 2020.04.22 2025.05.28 Literature Database
Probabilistic Safety for Bayesian Neural Networks Authors: Matthew Wicker, Luca Laurenti, Andrea Patane, Marta Kwiatkowska | Published: 2020-04-21 | Updated: 2020-06-19 Bayesian SecurityRobustness EvaluationDeep Learning Method 2020.04.21 2025.05.28 Literature Database
Certifying Joint Adversarial Robustness for Model Ensembles Authors: Mainuddin Ahmad Jonas, David Evans | Published: 2020-04-21 Model EnsembleRobustness Improvement MethodAdversarial Example 2020.04.21 2025.05.28 Literature Database
EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks Authors: Sanchari Sen, Balaraman Ravindran, Anand Raghunathan | Published: 2020-04-21 Machine LearningDeep Learning-Based IDSDefense Method 2020.04.21 2025.05.28 Literature Database
PhishOut: Effective Phishing Detection Using Selected Features Authors: Suhail Paliath, Mohammad Abu Qbeitah, Monther Aldwairi | Published: 2020-04-21 URL-based DetectionMulti-Class ClassificationMachine Learning 2020.04.21 2025.05.28 Literature Database
Scalable and Secure Architecture for Distributed IoT Systems Authors: Najmeddine Dhieb, Hakim Ghazzai, Hichem Besbes, Yehia Massoud | Published: 2020-04-20 Security AssuranceMalware ClassificationRole of Machine Learning 2020.04.20 2025.05.28 Literature Database