Literature Database

Adversarial Attacks on Linear Contextual Bandits

Authors: Evrard Garcelon, Baptiste Roziere, Laurent Meunier, Jean Tarbouriech, Olivier Teytaud, Alessandro Lazaric, Matteo Pirotta | Published: 2020-02-10 | Updated: 2020-10-23
Advice Provision
Robustness Evaluation
Adversarial attack

Adversarial Data Encryption

Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11
Poisoning
Adversarial attack
Cryptography

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats & Countermeasures

Authors: Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman | Published: 2020-02-10 | Updated: 2020-08-06
IoT-Specific Threats
Privacy Protection Mechanism
Cryptography

Feature-level Malware Obfuscation in Deep Learning

Authors: Keith Dillon | Published: 2020-02-10
Malware Classification
Malware Detection

Robust binary classification with the 01 loss

Authors: Yunzhe Xue, Meiyan Xie, Usman Roshan | Published: 2020-02-09
Robustness Improvement Method
Convergence Property
Machine Learning Technology

Input Validation for Neural Networks via Runtime Local Robustness Verification

Authors: Jiangchao Liu, Liqian Chen, Antoine Mine, Ji Wang | Published: 2020-02-09 | Updated: 2024-02-13
Robustness Improvement Method
Adversarial Example
Adversarial Perturbation Techniques

MDEA: Malware Detection with Evolutionary Adversarial Learning

Authors: Xiruo Wang, Risto Miikkulainen | Published: 2020-02-09 | Updated: 2020-04-17
Malicious Package Detection
Machine Learning Technology
Evolutionary Algorithm

Curse of Dimensionality on Randomized Smoothing for Certifiable Robustness

Authors: Aounon Kumar, Alexander Levine, Tom Goldstein, Soheil Feizi | Published: 2020-02-08 | Updated: 2020-08-14
Robustness Improvement Method
Convergence Property
Statistical Testing

Analysis of Random Perturbations for Robust Convolutional Neural Networks

Authors: Adam Dziedzic, Sanjay Krishnan | Published: 2020-02-08 | Updated: 2020-06-07
Robustness Improvement Method
Adversarial Example
Adversarial Perturbation Techniques

Certified Robustness to Label-Flipping Attacks via Randomized Smoothing

Authors: Elan Rosenfeld, Ezra Winston, Pradeep Ravikumar, J. Zico Kolter | Published: 2020-02-07 | Updated: 2020-08-11
Poisoning
Robustness Improvement Method
Continuous Linear Function