Literature Database

ATHENA: A Framework based on Diverse Weak Defenses for Building Adversarial Defense

Authors: Ying Meng, Jianhai Su, Jason O'Kane, Pooyan Jamshidi | Published: 2020-01-02 | Updated: 2020-10-16
Adversarial Learning
Watermark Evaluation
Effectiveness Analysis of Defense Methods

Deep Learning-Based Intrusion Detection System for Advanced Metering Infrastructure

Authors: Zakaria El Mrabet, Mehdi Ezzari, Hassan Elghazi, Badr Abou El Majd | Published: 2019-12-31
Optimization Methods
Deep Learning
Automated Intrusion Detection System

A Performance Comparison of Data Mining Algorithms Based Intrusion Detection System for Smart Grid

Authors: Zakaria El Mrabet, Hassan El Ghazi, Naima Kaabouch | Published: 2019-12-31
Model Selection Method
Taxonomy of Attacks
Automated Intrusion Detection System

privGAN: Protecting GANs from membership inference attacks at low cost

Authors: Sumit Mukherjee, Yixi Xu, Anusua Trivedi, Juan Lavista Ferres | Published: 2019-12-31 | Updated: 2020-12-13
Privacy Protection Method
Membership Inference
Optimization Methods

Face X-ray for More General Face Forgery Detection

Authors: Lingzhi Li, Jianmin Bao, Ting Zhang, Hao Yang, Dong Chen, Fang Wen, Baining Guo | Published: 2019-12-31 | Updated: 2020-04-19
Algorithm
Detection of Deepfakes
Adversarial Learning

A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms

Authors: Suchet Sapre, Pouyan Ahmadi, Khondkar Islam | Published: 2019-12-31
Model Selection Method
Taxonomy of Attacks
Automated Intrusion Detection System

Adversarial Example Generation using Evolutionary Multi-objective Optimization

Authors: Takahiro Suzuki, Shingo Takeshita, Satoshi Ono | Published: 2019-12-30
Effective Perturbation Methods
Multi-Objective Optimization
Adversarial Learning

Federated Variance-Reduced Stochastic Gradient Descent with Robustness to Byzantine Attacks

Authors: Zhaoxian Wu, Qing Ling, Tianyi Chen, Georgios B. Giannakis | Published: 2019-12-29 | Updated: 2021-02-03
SGD Characteristics
Robustness Evaluation
Adversarial Learning

Cyber Situation Awareness with Active Learning for Intrusion Detection

Authors: Steven McElwee, James Cannady | Published: 2019-12-29
Model Selection Method
Adversarial Learning
Automated Intrusion Detection System

Privacy-Preserving Public Release of Datasets for Support Vector Machine Classification

Authors: Farhad Farokhi | Published: 2019-12-29
Privacy Protection Method
Optimization Methods
Statistical Methods