Literature Database

Privacy Leakage Avoidance with Switching Ensembles

Authors: Rauf Izmailov, Peter Lin, Chris Mesterharm, Samyadeep Basu | Published: 2019-11-18
Privacy-Preserving Data Mining
Privacy Leakage
Membership Inference

A New Ensemble Adversarial Attack Powered by Long-term Gradient Memories

Authors: Zhaohui Che, Ali Borji, Guangtao Zhai, Suiyi Ling, Jing Li, Patrick Le Callet | Published: 2019-11-18
Backdoor Attack
Model Performance Evaluation
Adversarial Attack Methods

Machine Learning in Network Security Using KNIME Analytics

Authors: Munther Abualkibash | Published: 2019-11-18
Security Analysis
Data-Driven Clustering
Machine Learning Technology

Fine-Grained Static Detection of Obfuscation Transforms Using Ensemble-Learning and Semantic Reasoning

Authors: Ramtine Tofighi-Shirazi, Irina Mariuca Asavoae, Philippe Elbaz-Vincent | Published: 2019-11-18
Program Understanding
Model Performance Evaluation
Role of Machine Learning

Exploiting Human Social Cognition for the Detection of Fake and Fraudulent Faces via Memory Networks

Authors: Tharindu Fernando, Clinton Fookes, Simon Denman, Sridha Sridharan | Published: 2019-11-17
Model Performance Evaluation
Attention Mechanism
Image Forensics

Black-Box Adversarial Attack with Transferable Model-based Embedding

Authors: Zhichao Huang, Tong Zhang | Published: 2019-11-17 | Updated: 2020-01-05
Adversarial Example
Adversarial Attack Methods
Knowledge Transferability

The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks

Authors: Yuheng Zhang, Ruoxi Jia, Hengzhi Pei, Wenxiao Wang, Bo Li, Dawn Song | Published: 2019-11-17 | Updated: 2020-04-18
Privacy Violation
Reconstruction Attack
Knowledge Extraction Method

Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy

Authors: Min Du, Ruoxi Jia, Dawn Song | Published: 2019-11-16
Backdoor Attack
Privacy-Preserving Data Mining
Experimental Validation

Defending Against Model Stealing Attacks with Adaptive Misinformation

Authors: Sanjay Kariyappa, Moinuddin K Qureshi | Published: 2019-11-16
Adversarial Example
Adversarial Attack Methods
Effectiveness Analysis of Defense Methods

Suspicion-Free Adversarial Attacks on Clustering Algorithms

Authors: Anshuman Chhabra, Abhishek Roy, Prasant Mohapatra | Published: 2019-11-16
Model Performance Evaluation
Numerical Stability Issues
Adversarial Attack Methods