Literature Database

STGAN: A Unified Selective Transfer Network for Arbitrary Image Attribute Editing

Authors: Ming Liu, Yukang Ding, Min Xia, Xiao Liu, Errui Ding, Wangmeng Zuo, Shilei Wen | Published: 2019-04-22
Data Generation
Deepfake
Image Processing

Beyond Explainability: Leveraging Interpretability for Improved Adversarial Learning

Authors: Devinder Kumar, Ibrahim Ben-Daya, Kanav Vats, Jeffery Feng, Graham Taylor and, Alexander Wong | Published: 2019-04-21
Attack Evaluation
Adversarial Training
Machine Learning Technology

Android Malicious Application Classification Using Clustering

Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak | Published: 2019-04-21
Dataset Analysis
Malware Detection
Machine Learning Algorithm

Privacy-Enhancing Context Authentication from Location-Sensitive Data

Authors: Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas | Published: 2019-04-18 | Updated: 2019-07-10
Data Protection Method
Privacy Protection
Authentication Technology

Intrusion Detection Mechanism Using Fuzzy Rule Interpolation

Authors: Mohammad Almseidin, Szilveszter Kovacs | Published: 2019-04-18
DDoS Attack
Fuzzy System
Intrusion Detection System

Gotta Catch ‘Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks

Authors: Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao | Published: 2019-04-18 | Updated: 2020-09-28
Trapdoor Defense
Backdoor Attack
Adversarial Transferability

ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks

Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-04-17
Adversarial Example
Adversarial Learning
Machine Learning Method

Defensive Quantization: When Efficiency Meets Robustness

Authors: Ji Lin, Chuang Gan, Song Han | Published: 2019-04-17
Adversarial Learning
Adversarial Attack Detection
Quantized Neural Network

Adversarial Defense Through Network Profiling Based Path Extraction

Authors: Yuxian Qiu, Jingwen Leng, Cong Guo, Quan Chen, Chao Li, Minyi Guo, Yuhao Zhu | Published: 2019-04-17 | Updated: 2019-05-09
Model Performance Evaluation
Adversarial Attack Detection
Deep Learning

Helping IT and OT Defenders Collaborate

Authors: Glenn A. Fink, Penny McKenzie | Published: 2019-04-16
Control Model of CPS
Data Collection
Machine Learning Method