Literature Database

Better the Devil you Know: An Analysis of Evasion Attacks using Out-of-Distribution Adversarial Examples

Authors: Vikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal | Published: 2019-05-05
Poisoning
Adversarial Example
Adversarial Attack Detection

CharBot: A Simple and Effective Method for Evading DGA Classifiers

Authors: Jonathan Peck, Claire Nie, Raaghavi Sivaguru, Charles Grumer, Femi Olumofin, Bin Yu, Anderson Nascimento, Martine De Cock | Published: 2019-05-03 | Updated: 2019-05-30
Malware Detection
Adversarial Attack Detection
Machine Learning

Locally Differentially Private Naive Bayes Classification

Authors: Emre Yilmaz, Mohammad Al-Rubaie, J. Morris Chang | Published: 2019-05-03
Privacy Technique
Machine Learning
Dimensionality Reduction Method

Transfer of Adversarial Robustness Between Perturbation Types

Authors: Daniel Kang, Yi Sun, Tom Brown, Dan Hendrycks, Jacob Steinhardt | Published: 2019-05-03
Adversarial Example
Adversarial Attack Detection
Adaptive Adversarial Training

Generative Adversarial Network for Wireless Signal Spoofing

Authors: Yi Shi, Kemal Davaslioglu, Yalin E. Sagduyu | Published: 2019-05-03 | Updated: 2019-05-07
Attack Scenario Analysis
Machine Learning
Physical layer security

Mimic Learning to Generate a Shareable Network Intrusion Detection Model

Authors: Ahmed Shafee, Mohamed Baza, Douglas A. Talbert, Mostafa M. Fouda, Mahmoud Nabil, Mohamed Mahmoud | Published: 2019-05-02 | Updated: 2020-02-18
Poisoning
Model Design
Machine Learning

You Only Propagate Once: Accelerating Adversarial Training via Maximal Principle

Authors: Dinghuai Zhang, Tianyuan Zhang, Yiping Lu, Zhanxing Zhu, Bin Dong | Published: 2019-05-02 | Updated: 2019-11-01
Selection and Evaluation of Optimization Algorithms
Machine Learning
Adaptive Adversarial Training

Weight Map Layer for Noise and Adversarial Attack Robustness

Authors: Mohammed Amer, Tomás Maul | Published: 2019-05-02 | Updated: 2020-12-02
Robust Estimation
Future Research
Adversarial Attack Methods

NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks

Authors: Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, Boqing Gong | Published: 2019-05-01 | Updated: 2019-12-09
Adversarial Example
Adversarial Attack Methods
Deep Learning Technology

To believe or not to believe: Validating explanation fidelity for dynamic malware analysis

Authors: Li Chen, Carter Yagemann, Evan Downing | Published: 2019-04-30
Malware Detection
Deep Learning Technology
Image Classification Interpretation