Literature Database

Model Weight Theft With Just Noise Inputs: The Curious Case of the Petulant Attacker

Authors: Nicholas Roberts, Vinay Uday Prabhu, Matthew McAteer | Published: 2019-12-19
Data Generation
Model Design
Model Communication

Adversarial VC-dimension and Sample Complexity of Neural Networks

Authors: Zetong Qi, T. J. Wilder | Published: 2019-12-18
Robustness
Adversarial Spectrum Attack Detection
Continuous Linear Function

SIGMA : Strengthening IDS with GAN and Metaheuristics Attacks

Authors: Simon Msika, Alejandro Quintero, Foutse Khomh | Published: 2019-12-18
Hybrid Algorithm
Adversarial Learning
Automated Intrusion Detection System

Learning to Prevent Leakage: Privacy-Preserving Inference in the Mobile Cloud

Authors: Shuang Zhang, Liyao Xiang, Congcong Li, Yixuan Wang, Quanshi Zhang, Wei Wang, Bo Li | Published: 2019-12-18 | Updated: 2021-06-15
Privacy Protection
Performance Evaluation Metrics
Deep Learning Method

MimicGAN: Robust Projection onto Image Manifolds with Corruption Mimicking

Authors: Rushil Anirudh, Jayaraman J. Thiagarajan, Bhavya Kailkhura, Timo Bremer | Published: 2019-12-16 | Updated: 2020-04-30
Data Generation
Robustness
Performance Evaluation Metrics

Adversarial Model Extraction on Graph Neural Networks

Authors: David DeFazio, Arti Ramesh | Published: 2019-12-16
Graph Neural Network
Model Design
Fundamentals of Machine Learning

Constructing a provably adversarially-robust classifier from a high accuracy one

Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2019-12-16
Robustness
Fundamentals of Machine Learning
Statistical Analysis

DAmageNet: A Universal Adversarial Dataset

Authors: Sizhe Chen, Xiaolin Huang, Zhengbao He, Chengjin Sun | Published: 2019-12-16
Data Generation
Robustness
Deep Learning Method

Pseudo Random Number Generation: a Reinforcement Learning approach

Authors: Luca Pasqualini, Maurizio Parton | Published: 2019-12-15
Data Generation
Reward Mechanism Design
Deep Reinforcement Learning

Artificial Intelligence Techniques for Security Vulnerability Prevention

Authors: Steve Kommrusch | Published: 2019-12-14
Machine Learning Technology
Vulnerability Assessment Method
Automated Vulnerability Remediation