Literature Database

Exploiting Human Social Cognition for the Detection of Fake and Fraudulent Faces via Memory Networks

Authors: Tharindu Fernando, Clinton Fookes, Simon Denman, Sridha Sridharan | Published: 2019-11-17
Model Performance Evaluation
Attention Mechanism
Image Forensics

Black-Box Adversarial Attack with Transferable Model-based Embedding

Authors: Zhichao Huang, Tong Zhang | Published: 2019-11-17 | Updated: 2020-01-05
Adversarial Example
Adversarial Attack Methods
Knowledge Transferability

The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks

Authors: Yuheng Zhang, Ruoxi Jia, Hengzhi Pei, Wenxiao Wang, Bo Li, Dawn Song | Published: 2019-11-17 | Updated: 2020-04-18
Privacy Violation
Reconstruction Attack
Knowledge Extraction Method

Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy

Authors: Min Du, Ruoxi Jia, Dawn Song | Published: 2019-11-16
Backdoor Attack
Privacy-Preserving Data Mining
Experimental Validation

Defending Against Model Stealing Attacks with Adaptive Misinformation

Authors: Sanjay Kariyappa, Moinuddin K Qureshi | Published: 2019-11-16
Adversarial Example
Adversarial Attack Methods
Effectiveness Analysis of Defense Methods

Suspicion-Free Adversarial Attacks on Clustering Algorithms

Authors: Anshuman Chhabra, Abhishek Roy, Prasant Mohapatra | Published: 2019-11-16
Model Performance Evaluation
Numerical Stability Issues
Adversarial Attack Methods

DomainGAN: Generating Adversarial Examples to Attack Domain Generation Algorithm Classifiers

Authors: Isaac Corley, Jonathan Lwowski, Justin Hoffman | Published: 2019-11-14 | Updated: 2020-02-14
Botnet Detection
Model Performance Evaluation
Adversarial Attack Methods

There is Limited Correlation between Coverage and Robustness for Deep Neural Networks

Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14
Model Performance Evaluation
Adversarial Example
Adversarial Attack Methods

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain | Published: 2019-11-13
Backdoor Attack
Discussion on Protocol Vulnerabilities and Attack Scenarios
Attacker Behavior Analysis

Adversarial Examples in Modern Machine Learning: A Review

Authors: Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker | Published: 2019-11-13 | Updated: 2019-11-15
Poisoning
Adversarial Example
Adversarial Attack Methods