Literature Database

Active Subspace of Neural Networks: Structural Analysis and Universal Attacks

Authors: Chunfeng Cui, Kaiqi Zhang, Talgat Daulbaev, Julia Gusak, Ivan Oseledets, Zheng Zhang | Published: 2019-10-29 | Updated: 2020-04-29
Risks of Model Compression
Attack Method
Dimensionality Reduction Method

Secure Evaluation of Quantized Neural Networks

Authors: Anders Dalskov, Daniel Escudero, Marcel Keller | Published: 2019-10-28 | Updated: 2021-03-01
Protocol Procedure
Model Architecture
Evaluation Method

Understanding and Quantifying Adversarial Examples Existence in Linear Classification

Authors: Xupeng Shi, A. Adam Ding | Published: 2019-10-27
Adversarial Example
Linear Model
Effectiveness Analysis of Defense Methods

Detection of Adversarial Attacks and Characterization of Adversarial Subspace

Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-10-26
Secure Logistic Regression
Attack Method
Adversarial Example Detection

Automatic Driver Identification from In-Vehicle Network Logs

Authors: Mina Remeli, Szilvia Lestyan, Gergely Acs, Gergely Biczok | Published: 2019-10-25
Privacy Violation
Model Performance Evaluation
Vehicle Network Security

Label Smoothing and Logit Squeezing: A Replacement for Adversarial Training?

Authors: Ali Shafahi, Amin Ghiasi, Furong Huang, Tom Goldstein | Published: 2019-10-25
Poisoning
Improvement of Learning
Adversarial Example

Substra: a framework for privacy-preserving, traceable and collaborative Machine Learning

Authors: Mathieu N Galtier, Camille Marini | Published: 2019-10-25
Privacy Management
Cooperative System
Evaluation Method

Neurlux: Dynamic Malware Analysis Without Feature Engineering

Authors: Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna | Published: 2019-10-24
Model Architecture
Dynamic Analysis Method
Performance Evaluation Metrics

A Note on Our Submission to Track 4 of iDASH 2019

Authors: Marcel Keller, Ke Sun | Published: 2019-10-24
Improvement of Learning
Evaluation Method
evaluation metrics

Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique

Authors: Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza | Published: 2019-10-24 | Updated: 2020-12-26
Performance Evaluation
Deep Learning Technology
Image Feature Extraction