Literature Database

Square Attack: a query-efficient black-box adversarial attack via random search

Authors: Maksym Andriushchenko, Francesco Croce, Nicolas Flammarion, Matthias Hein | Published: 2019-11-29 | Updated: 2020-07-29
Model Evaluation
Adversarial Attack Detection
Adversarial Training

Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One

Authors: David Mohaisen, Songqing Chen | Published: 2019-11-28
Model Evaluation
Adversarial Example
Machine Learning Algorithm

Free-riders in Federated Learning: Attacks and Defenses

Authors: Jierui Lin, Min Du, Jian Liu | Published: 2019-11-28
FR Detection Mechanism
Free-Rider Attack
Anomaly Detection Method

Android Botnet Detection using Convolutional Neural Networks

Authors: Sina Hojjatinia, Sajad Hamzenejadi, Hadis Mohseni | Published: 2019-11-27
Botnet Detection
Model Performance Evaluation
Machine Learning Application

Survey of Attacks and Defenses on Edge-Deployed Neural Networks

Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27
Privacy-Preserving Data Mining
Attack Type
Vulnerability Analysis

An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense

Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26
Poisoning
Adversarial Example
Research Methodology

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning

Authors: Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-11-26 | Updated: 2021-11-21
Poisoning
Model Performance Evaluation
Attack Type

Defending Against Adversarial Machine Learning

Authors: Alison Jenkins | Published: 2019-11-26
Model Performance Evaluation
Feature Selection Method
Statistical Analysis

Assessing Supply Chain Cyber Risks

Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26
Risk Management
Information Security
Attack Type

Network Intrusion Detection based on LSTM and Feature Embedding

Authors: Hyeokmin Gwon, Chungjun Lee, Rakun Keum, Heeyoul Choi | Published: 2019-11-26
Attack Type
Machine Learning Application
Deep Learning-Based IDS