Literature Database

On the Robustness of Deep K-Nearest Neighbors

Authors: Chawin Sitawarin, David Wagner | Published: 2019-03-20
Certified Robustness
Effective Perturbation Methods
Adversarial Attack Detection

An Evaluation of Bitcoin Address Classification based on Transaction History Summarization

Authors: Yu-Jing Lin, Po-Wei Wu, Cheng-Han Hsu, I-Ping Tu, Shih-wei Liao | Published: 2019-03-19
Transaction Flow
Feature Selection Method
Statistical Analysis

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Authors: Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson | Published: 2019-03-18
Signal Processing Techniques
Adversarial Attack Methods
Speech Synthesis Technology

Clonability of anti-counterfeiting printable graphical codes: a machine learning approach

Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy | Published: 2019-03-18
Performance Evaluation
Adversarial Attack Detection
Deep Learning Model

Generating Adversarial Examples With Conditional Generative Adversarial Net

Authors: Ping Yu, Kaitao Song, Jianfeng Lu | Published: 2019-03-18
Certified Robustness
Adversarial Example
Adversarial Attack Detection

Adversarial Attacks on Deep Neural Networks for Time Series Classification

Authors: Hassan Ismail Fawaz, Germain Forestier, Jonathan Weber, Lhassane Idoumghar, Pierre-Alain Muller | Published: 2019-03-17 | Updated: 2019-04-26
Adversarial Example
Adversarial Learning
Adversarial Attack Detection

SLSGD: Secure and Efficient Distributed On-device Machine Learning

Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta | Published: 2019-03-16 | Updated: 2019-10-01
SGD Characteristics
Robust Optimization
Federated Learning

GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection

Authors: Quoc Phong Nguyen, Kar Wai Lim, Dinil Mon Divakaran, Kian Hsiang Low, Mun Choon Chan | Published: 2019-03-15
Spam Detection Method
Botnet Traffic
Feature Extraction Method

A Research Agenda: Dynamic Models to Defend Against Correlated Attacks

Authors: Ian Goodfellow | Published: 2019-03-14
Certified Robustness
Dynamic Service Scheduling
Adversarial Attack Methods

Attribution-driven Causal Analysis for Detection of Adversarial Examples

Authors: Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami | Published: 2019-03-14
Certified Robustness
Adversarial Learning
Adversarial Attack Methods