Literature Database

Machine-Learning Techniques for Detecting Attacks in SDN

Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2019-10-02
Cyber Threat
Attack Evaluation
Machine Learning Algorithm

Analyzing and Improving Neural Networks by Generating Semantic Counterexamples through Differentiable Rendering

Authors: Lakshya Jain, Varun Chandrasekaran, Uyeong Jang, Wilson Wu, Andrew Lee, Andy Yan, Steven Chen, Somesh Jha, Sanjit A. Seshia | Published: 2019-10-02 | Updated: 2020-07-17
Semantic Information Extraction
Attack Evaluation
Adversarial Attack Methods

Intrusion detection systems using classical machine learning techniques versus integrated unsupervised feature learning and deep neural network

Authors: Shisrut Rawat, Aishwarya Srinivasan, Vinayakumar R | Published: 2019-10-01
Model Design and Accuracy
Attack Evaluation
Machine Learning Algorithm

An Efficient and Margin-Approaching Zero-Confidence Adversarial Attack

Authors: Yang Zhang, Shiyu Chang, Mo Yu, Kaizhi Qian | Published: 2019-10-01
Backdoor Attack
Model Design and Accuracy
Adversarial Attack Methods

Cross-Layer Strategic Ensemble Defense Against Adversarial Examples

Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-10-01
Poisoning
Attack Evaluation
Adversarial Example

Hidden Trigger Backdoor Attacks

Authors: Aniruddha Saha, Akshayvarun Subramanya, Hamed Pirsiavash | Published: 2019-09-30 | Updated: 2019-12-21
Training Data Generation
Backdoor Attack
Adversarial attack

Black-box Adversarial Attacks with Bayesian Optimization

Authors: Satya Narayan Shukla, Anit Kumar Sahu, Devin Willmott, J. Zico Kolter | Published: 2019-09-30
Bayesian Optimization
Model Design and Accuracy
Adversarial Attack Methods

Universal Approximation with Certified Networks

Authors: Maximilian Baader, Matthew Mirman, Martin Vechev | Published: 2019-09-30 | Updated: 2020-01-14
Convergence Analysis
Information Security
Machine Learning Technology

Min-Max Optimization without Gradients: Convergence and Applications to Adversarial ML

Authors: Sijia Liu, Songtao Lu, Xiangyi Chen, Yao Feng, Kaidi Xu, Abdullah Al-Dujaili, Minyi Hong, Una-May O'Reilly | Published: 2019-09-30 | Updated: 2020-06-17
Poisoning
Convergence Analysis
Adversarial attack

Decision Explanation and Feature Importance for Invertible Networks

Authors: Juntang Zhuang, Nicha C. Dvornek, Xiaoxiao Li, Junlin Yang, James S. Duncan | Published: 2019-09-30 | Updated: 2019-10-15
Model Design and Accuracy
Machine Learning Algorithm
Feature Selection Method