Instance Enhancement Batch Normalization: an Adaptive Regulator of Batch Noise Authors: Senwei Liang, Zhongzhan Huang, Mingfu Liang, Haizhao Yang | Published: 2019-08-12 | Updated: 2019-09-18 Training MethodDeep Reinforcement LearningAdaptive Misuse Detection 2019.08.12 2025.05.28 Literature Database
Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs) Authors: Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse | Published: 2019-08-09 LSTM Model Performance EvaluationApplication of Text ClassificationFeature Engineering 2019.08.09 2025.05.28 Literature Database
On the Adversarial Robustness of Neural Networks without Weight Transport Authors: Mohamed Akrout | Published: 2019-08-09 | Updated: 2019-10-03 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.09 2025.05.28 Literature Database
Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2019-08-09 | Updated: 2020-09-28 Trigger DetectionTrojan DetectionBackdoor Detection 2019.08.09 2025.05.28 Literature Database
Defending Against Adversarial Iris Examples Using Wavelet Decomposition Authors: Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-08-08 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.08 2025.05.28 Literature Database
Universal Adversarial Audio Perturbations Authors: Sajjad Abdoli, Luiz G. Hafemann, Jerome Rony, Ismail Ben Ayed, Patrick Cardinal, Alessandro L. Koerich | Published: 2019-08-08 | Updated: 2020-11-17 Adversarial ExampleAdversarial Attack MethodsSpeech Signal Processing 2019.08.08 2025.05.28 Literature Database
Local Differential Privacy for Deep Learning Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe, M. Atiquzzaman | Published: 2019-08-08 | Updated: 2019-11-09 Privacy Enhancing TechnologyPrompt InjectionPrivacy Protection in Machine Learning 2019.08.08 2025.05.28 Literature Database
Investigating Decision Boundaries of Trained Neural Networks Authors: Roozbeh Yousefzadeh, Dianne P O'Leary | Published: 2019-08-07 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2019.08.07 2025.05.28 Literature Database
BlurNet: Defense by Filtering the Feature Maps Authors: Ravi Raju, Mikko Lipasti | Published: 2019-08-06 | Updated: 2020-05-16 Robustness Improvement MethodAttack EvaluationAdversarial Attack Methods 2019.08.06 2025.05.28 Literature Database
Model Agnostic Defence against Backdoor Attacks in Machine Learning Authors: Sakshi Udeshi, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, Sudipta Chattopadhyay | Published: 2019-08-06 | Updated: 2022-03-31 Backdoor AttackAttack EvaluationContent Specialized for Toxicity Attacks 2019.08.06 2025.05.28 Literature Database