Literature Database

Reverse KL-Divergence Training of Prior Networks: Improved Uncertainty and Adversarial Robustness

Authors: Andrey Malinin, Mark Gales | Published: 2019-05-31 | Updated: 2019-12-02
Poisoning
Uncertainty Estimation
Generative Model

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

Authors: Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai | Published: 2019-05-31
Data Collection Method
Network Traffic Analysis
Performance Evaluation Method

Bypassing Backdoor Detection Algorithms in Deep Learning

Authors: Te Juin Lester Tan, Reza Shokri | Published: 2019-05-31 | Updated: 2020-06-06
Pruning Method
Membership Inference
Adversarial Attack Methods

Identifying Classes Susceptible to Adversarial Attacks

Authors: Rangeet Pan, Md Johirul Islam, Shibbir Ahmed, Hridesh Rajan | Published: 2019-05-30
Vulnerability of Adversarial Examples
Adversarial Attack Methods
Deep Learning

Speaker Anonymization Using X-vector and Neural Waveform Models

Authors: Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen, Massimiliano Todisco, Nicholas Evans, Jean-Francois Bonastre | Published: 2019-05-30
Privacy-Preserving Data Mining
Deep Learning Technology
Speech Signal Processing

Bandlimiting Neural Networks Against Adversarial Attacks

Authors: Yuping Lin, Kasra Ahmadi K. A., Hui Jiang | Published: 2019-05-30
Poisoning
Vulnerability of Adversarial Examples
Deep Learning

Quantifying the Privacy Risks of Learning High-Dimensional Graphical Models

Authors: Sasi Kumar Murakonda, Reza Shokri, George Theodorakopoulos | Published: 2019-05-29 | Updated: 2021-02-17
Privacy Enhancing Technology
Membership Inference
Information-Theoretic Evaluation

Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward

Authors: Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-05-29
Backdoor Attack
Adversarial Example
Adversarial Attack Methods

Zeroth-Order Stochastic Alternating Direction Method of Multipliers for Nonconvex Nonsmooth Optimization

Authors: Feihu Huang, Shangqian Gao, Songcan Chen, Heng Huang | Published: 2019-05-29 | Updated: 2019-07-30
Convergence analysis
Optimization Methods
Privacy Protection in Machine Learning

Defending Against Neural Fake News

Authors: Rowan Zellers, Ari Holtzman, Hannah Rashkin, Yonatan Bisk, Ali Farhadi, Franziska Roesner, Yejin Choi | Published: 2019-05-29 | Updated: 2020-12-11
Identification of AI Output
Cyber Threat
Deep Learning Method