Literature Database

Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep Learning

Authors: Zain ul abi Din, Panagiotis Tigas, Samuel T. King, Benjamin Livshits | Published: 2019-05-17 | Updated: 2020-05-20
Model Evaluation
Ad Blocking System
Information Security

POPQORN: Quantifying Robustness of Recurrent Neural Networks

Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17
Poisoning
Model Evaluation
Performance Evaluation Method

Simple Black-box Adversarial Attacks

Authors: Chuan Guo, Jacob R. Gardner, Yurong You, Andrew Gordon Wilson, Kilian Q. Weinberger | Published: 2019-05-17 | Updated: 2019-08-15
Query Generation Method
Performance Evaluation Method
Adversarial Training

Online Multivariate Anomaly Detection and Localization for High-dimensional Settings

Authors: Mahsa Mozaffari, Yasin Yilmaz | Published: 2019-05-17 | Updated: 2020-07-14
DDoS Attack
Performance Evaluation Method
High-Dimensional Data Analysis

Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection

Authors: Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin | Published: 2019-05-16
Data Preprocessing
Malware Detection Method
Model Evaluation

Fooling Computer Vision into Inferring the Wrong Body Mass Index

Authors: Owen Levin, Zihang Meng, Vikas Singh, Xiaojin Zhu | Published: 2019-05-16
Data Preprocessing
Performance Evaluation Method
Attack Chain Analysis

Spatial Positioning Token (SPToken) for Smart Mobility

Authors: Roman Overko, Rodrigo H. Ordonez-Hurtado, Sergiy Zhuk, Pietro Ferraro, Andrew Cullen, Robert Shorten | Published: 2019-05-16 | Updated: 2020-12-11
Privacy Issues
Traffic Simulation
Reinforcement Learning

Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization

Authors: Seungyong Moon, Gaon An, Hyun Oh Song | Published: 2019-05-16 | Updated: 2022-10-18
Query Generation Method
Poisoning
Optimization Methods

Data Poisoning Attacks on Stochastic Bandits

Authors: Fang Liu, Ness Shroff | Published: 2019-05-16
Algorithm
Poisoning
Attack Chain Analysis

On Norm-Agnostic Robustness of Adversarial Training

Authors: Bai Li, Changyou Chen, Wenlin Wang, Lawrence Carin | Published: 2019-05-15
Poisoning
Adversarial Example
Adversarial Training