Literature Database

Adversarial-Playground: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning

Authors: Andrew P. Norton, Yanjun Qi | Published: 2017-08-01
Educational Approach
Adversarial Example
Image Classification Method

Quantum Privacy-Preserving Perceptron

Authors: Shenggang Ying, Mingsheng Ying, Yuan Feng | Published: 2017-07-31
Privacy Enhancing Technology
Differential Privacy
Quantum Computing Method

Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data

Authors: Benjamin L. Bullough, Anna K. Yanchenko, Christopher L. Smith, Joseph R. Zipkin | Published: 2017-07-25
Bias in Training Data
Information Security
Machine Learning Framework

Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning

Authors: Artur Filipowicz, Thee Chanyaswad, S. Y. Kung | Published: 2017-07-24
Data Origins and Evolution
Privacy Enhancing Technology
Privacy Technique

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

Authors: Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici | Published: 2017-07-19 | Updated: 2018-06-24
Backdoor Attack
Dataset for Malware Classification
Certified Robustness

Houdini: Fooling Deep Structured Prediction Models

Authors: Moustapha Cisse, Yossi Adi, Natalia Neverova, Joseph Keshet | Published: 2017-07-17
Certified Robustness
Adversarial Attack Assessment
Speech Recognition Technology

Foolbox: A Python toolbox to benchmark the robustness of machine learning models

Authors: Jonas Rauber, Wieland Brendel, Matthias Bethge | Published: 2017-07-13 | Updated: 2018-03-20
Framework Support
Certified Robustness
robustness requirements

Process Monitoring on Sequences of System Call Count Vectors

Authors: Michael Dymshits, Ben Myara, David Tolpin | Published: 2017-07-12
Data Collection
Machine Learning Application
Anomaly Detection Algorithm

NO Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles

Authors: Jiajun Lu, Hussein Sibai, Evan Fabry, David Forsyth | Published: 2017-07-12
Adversarial Example
Adversarial Example Detection
Image Processing

A Survey on Resilient Machine Learning

Authors: Atul Kumar, Sameep Mehta | Published: 2017-07-11
Model Inversion
Certified Robustness
Model Extraction Attack