Literature Database

Hardening Random Forest Cyber Detectors Against Adversarial Attacks

Authors: Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti | Published: 2019-12-09
Data Generation
Robustness
Adversarial Example

Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms

Authors: Guangxia Lia, Yulong Shena, Peilin Zhaob, Xiao Lu, Jia Liu, Yangyang Liu, Steven C. H. Hoi | Published: 2019-12-08
Attack Detection
Machine Learning Technology
Industrial Control System

An Empirical Study on the Relation between Network Interpretability and Adversarial Robustness

Authors: Adam Noack, Isaac Ahern, Dejing Dou, Boyang Li | Published: 2019-12-07 | Updated: 2020-12-04
Robustness
Loss Function
Deep Learning Method

Principal Component Properties of Adversarial Samples

Authors: Malhar Jere, Sandro Herbig, Christine Lind, Farinaz Koushanfar | Published: 2019-12-07
Robustness
Adversarial Example
Adversarial Spectrum Attack Detection

An Empirical Study on the Intrinsic Privacy of SGD

Authors: Stephanie L. Hyland, Shruti Tople | Published: 2019-12-05 | Updated: 2022-02-28
SGD Characteristics
Privacy Protection
Deep Learning Method

Label-Consistent Backdoor Attacks

Authors: Alexander Turner, Dimitris Tsipras, Aleksander Madry | Published: 2019-12-05 | Updated: 2019-12-06
Backdoor Attack
Poisoning
Adversarial Example

ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction

Authors: Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh | Published: 2019-12-05
Privacy Enhancing Protocol
Discussion on Protocol Vulnerabilities and Attack Scenarios
Performance Evaluation

A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks

Authors: Prithviraj Dasgupta, Joseph B. Collins | Published: 2019-12-04
Data Generation
Vulnerability of Adversarial Examples
Adversarial Transferability

A Survey of Black-Box Adversarial Attacks on Computer Vision Models

Authors: Siddhant Bhambri, Sumanyu Muku, Avinash Tulasi, Arun Balaji Buduru | Published: 2019-12-03 | Updated: 2020-02-07
Poisoning
Vulnerability of Adversarial Examples
Effectiveness Analysis of Defense Methods

FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks

Authors: Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique | Published: 2019-12-03 | Updated: 2020-05-14
Performance Evaluation
Machine Learning
Deep Learning