Literature Database

Luring of transferable adversarial perturbations in the black-box paradigm

Authors: Rémi Bernhard, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2020-04-10 | Updated: 2021-03-03
Robustness Improvement Method
Attack Evaluation
Adversarial Example

Blind Adversarial Pruning: Balance Accuracy, Efficiency and Robustness

Authors: Haidong Xie, Lixin Qian, Xueshuang Xiang, Naijin Liu | Published: 2020-04-10
Pruning Method
Robustness
Experimental Validation

Blind Adversarial Training: Balance Accuracy and Robustness

Authors: Haidong Xie, Xueshuang Xiang, Naijin Liu, Bin Dong | Published: 2020-04-10
Robustness
Adversarial Learning
Adaptive Adversarial Training

Decentralized Differentially Private Segmentation with PATE

Authors: Dominik Fay, Jens Sjölund, Tobias J. Oechtering | Published: 2020-04-10
Information-Theoretic Evaluation
Deep Learning
Image Feature Extraction

TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems

Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09
Attack Evaluation
Vulnerability Assessment Method
Defense Method

Deep Learning and Open Set Malware Classification: A Survey

Authors: Jingyun Jia | Published: 2020-04-08
Open Set Recognition
Poisoning
Malware Classification

High Accuracy Phishing Detection Based on Convolutional Neural Networks

Authors: Suleiman Y. Yerima, Mohammed K. Alzaylaee | Published: 2020-04-08
URL-based Detection
Training Method
Machine Learning Technology

Feature Partitioning for Robust Tree Ensembles and their Certification in Adversarial Scenarios

Authors: Stefano Calzavara, Claudio Lucchese, Federico Marcuzzi, Salvatore Orlando | Published: 2020-04-07
Robustness Evaluation
Attack Evaluation
Maximum Coverage Problem

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Authors: Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg | Published: 2020-04-07
Competitive Cooperative Systems
Computational Efficiency
Defense Method

Challenges in Forecasting Malicious Events from Incomplete Data

Authors: Nazgol Tavabi, Andrés Abeliuk, Negar Mokhberian, Jeremy Abramson, Kristina Lerman | Published: 2020-04-06
Security Analysis
Dataset evaluation
Vulnerability Assessment Method