Literature Database

Politics of Adversarial Machine Learning

Authors: Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar | Published: 2020-02-01 | Updated: 2020-04-26
Membership Inference
Human Rights and Technology
Defense Method

An Autonomous Intrusion Detection System Using an Ensemble of Advanced Learners

Authors: Amir Andalib, Vahid Tabataba Vakili | Published: 2020-01-31 | Updated: 2020-12-29
Security Analysis
Machine Learning Technology
Feature Extraction Method

FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications

Authors: Dou Goodman, Lv Zhonghou, Wang minghua | Published: 2020-01-31
Text Perturbation Method
Adversarial Perturbation Techniques
Natural Language Processing

Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

Authors: Yigit Alparslan, Ken Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt | Published: 2020-01-30 | Updated: 2021-02-08
Robustness Improvement Method
Adversarial Example
Adversarial Perturbation Techniques

A4 : Evading Learning-based Adblockers

Authors: Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq | Published: 2020-01-29
Adversarial Perturbation Techniques
Adversarial Transferability
Machine Learning Technology

Regularization Helps with Mitigating Poisoning Attacks: Distributionally-Robust Machine Learning Using the Wasserstein Distance

Authors: Farhad Farokhi | Published: 2020-01-29
Robustness Improvement Method
Content Specialized for Toxicity Attacks
Continuous Linear Function

Modelling and Quantifying Membership Information Leakage in Machine Learning

Authors: Farhad Farokhi, Mohamed Ali Kaafar | Published: 2020-01-29 | Updated: 2020-04-28
Privacy Protection
Membership Inference
Information-Theoretic Approach

IoT Behavioral Monitoring via Network Traffic Analysis

Authors: Arunan Sivanathan | Published: 2020-01-28
IoT Traffic Characteristics
Security Analysis
Device Identification Method

Privacy-Preserving Gaussian Process Regression — A Modular Approach to the Application of Homomorphic Encryption

Authors: Peter Fenner, Edward O. Pyzer-Knapp | Published: 2020-01-28
Privacy Protection
Cryptography
Machine Learning Technology

Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis

Authors: William Briguglio, Sherif Saad | Published: 2020-01-27
Robustness Improvement Method
Machine Learning Technology
Feature Extraction Method