Literature Database

Detection of Advanced Malware by Machine Learning Techniques

Authors: Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay | Published: 2019-03-07
Malware Evolution
Random Forest
Selection Method

Adversarial Out-domain Examples for Generative Models

Authors: Dario Pasquini, Marco Mingione, Massimo Bernaschi | Published: 2019-03-07 | Updated: 2019-05-13
Out-of-Distribution Detection
Adversarial Learning
Adversarial Training

GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier

Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-03-06
Certified Robustness
Adversarial Learning
Adversarial Training

Improving SIEM for Critical SCADA Water Infrastructures Using Machine Learning

Authors: Hanan Hindy, David Brosset, Ethan Bayne, Amar Seeam, Xavier Bellekens | Published: 2019-03-06
Sensor Information Management
Data Dependency
Machine Learning Algorithm

Online Data Poisoning Attack

Authors: Xuezhou Zhang, Xiaojin Zhu, Laurent Lessard | Published: 2019-03-05 | Updated: 2019-05-30
Poisoning
Reinforcement Learning Attack
Optimization Problem

Adversarial Examples on Graph Data: Deep Insights into Attack and Defense

Authors: Huijun Wu, Chen Wang, Yuriy Tyshetskiy, Andrew Docherty, Kai Lu, Liming Zhu | Published: 2019-03-05 | Updated: 2019-05-22
Certified Robustness
Adversarial Example
Adversarial Perturbation Techniques

Complement Objective Training

Authors: Hao-Yun Chen, Pei-Hsin Wang, Chun-Hao Liu, Shih-Chieh Chang, Jia-Yu Pan, Yu-Ting Chen, Wei Wei, Da-Cheng Juan | Published: 2019-03-04 | Updated: 2019-03-21
Multi-Class Classification
Robustness Improvement Method
Adversarial Learning

PuVAE: A Variational Autoencoder to Purify Adversarial Examples

Authors: Uiwon Hwang, Jaewoo Park, Hyemi Jang, Sungroh Yoon, Nam Ik Cho | Published: 2019-03-02
Poisoning
Robustness Improvement Method
Adversarial Perturbation Techniques

Attacking Graph-based Classification via Manipulating the Graph Structure

Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2019-03-01 | Updated: 2019-08-13
Poisoning
Model Inversion
Adversarial Graph Classification

Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications

Authors: Bryse Flowers, R. Michael Buehrer, William C. Headley | Published: 2019-03-01
Adversarial Learning
Adversarial Perturbation Techniques
Wireless Channel Detection