Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep Learning Authors: Zain ul abi Din, Panagiotis Tigas, Samuel T. King, Benjamin Livshits | Published: 2019-05-17 | Updated: 2020-05-20 Model EvaluationAd Blocking SystemInformation Security 2019.05.17 2025.05.28 Literature Database
POPQORN: Quantifying Robustness of Recurrent Neural Networks Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17 PoisoningModel EvaluationPerformance Evaluation Method 2019.05.17 2025.05.28 Literature Database
Simple Black-box Adversarial Attacks Authors: Chuan Guo, Jacob R. Gardner, Yurong You, Andrew Gordon Wilson, Kilian Q. Weinberger | Published: 2019-05-17 | Updated: 2019-08-15 Query Generation MethodPerformance Evaluation MethodAdversarial Training 2019.05.17 2025.05.28 Literature Database
Online Multivariate Anomaly Detection and Localization for High-dimensional Settings Authors: Mahsa Mozaffari, Yasin Yilmaz | Published: 2019-05-17 | Updated: 2020-07-14 DDoS AttackPerformance Evaluation MethodHigh-Dimensional Data Analysis 2019.05.17 2025.05.28 Literature Database
Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection Authors: Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin | Published: 2019-05-16 Data PreprocessingMalware Detection MethodModel Evaluation 2019.05.16 2025.05.28 Literature Database
Fooling Computer Vision into Inferring the Wrong Body Mass Index Authors: Owen Levin, Zihang Meng, Vikas Singh, Xiaojin Zhu | Published: 2019-05-16 Data PreprocessingPerformance Evaluation MethodAttack Chain Analysis 2019.05.16 2025.05.28 Literature Database
Spatial Positioning Token (SPToken) for Smart Mobility Authors: Roman Overko, Rodrigo H. Ordonez-Hurtado, Sergiy Zhuk, Pietro Ferraro, Andrew Cullen, Robert Shorten | Published: 2019-05-16 | Updated: 2020-12-11 Privacy IssuesTraffic SimulationReinforcement Learning 2019.05.16 2025.05.28 Literature Database
Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization Authors: Seungyong Moon, Gaon An, Hyun Oh Song | Published: 2019-05-16 | Updated: 2022-10-18 Query Generation MethodPoisoningOptimization Methods 2019.05.16 2025.05.28 Literature Database
Data Poisoning Attacks on Stochastic Bandits Authors: Fang Liu, Ness Shroff | Published: 2019-05-16 AlgorithmPoisoningAttack Chain Analysis 2019.05.16 2025.05.28 Literature Database
On Norm-Agnostic Robustness of Adversarial Training Authors: Bai Li, Changyou Chen, Wenlin Wang, Lawrence Carin | Published: 2019-05-15 PoisoningAdversarial ExampleAdversarial Training 2019.05.15 2025.05.28 Literature Database