Adversarial-Playground: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning Authors: Andrew P. Norton, Yanjun Qi | Published: 2017-08-01 Educational ApproachAdversarial ExampleImage Classification Method 2017.08.01 2025.05.28 Literature Database
Quantum Privacy-Preserving Perceptron Authors: Shenggang Ying, Mingsheng Ying, Yuan Feng | Published: 2017-07-31 Privacy Enhancing TechnologyDifferential PrivacyQuantum Computing Method 2017.07.31 2025.05.28 Literature Database
Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data Authors: Benjamin L. Bullough, Anna K. Yanchenko, Christopher L. Smith, Joseph R. Zipkin | Published: 2017-07-25 Bias in Training DataInformation SecurityMachine Learning Framework 2017.07.25 2025.05.28 Literature Database
Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning Authors: Artur Filipowicz, Thee Chanyaswad, S. Y. Kung | Published: 2017-07-24 Data Origins and EvolutionPrivacy Enhancing TechnologyPrivacy Technique 2017.07.24 2025.05.28 Literature Database
Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers Authors: Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici | Published: 2017-07-19 | Updated: 2018-06-24 Backdoor AttackDataset for Malware ClassificationCertified Robustness 2017.07.19 2025.05.28 Literature Database
Houdini: Fooling Deep Structured Prediction Models Authors: Moustapha Cisse, Yossi Adi, Natalia Neverova, Joseph Keshet | Published: 2017-07-17 Certified RobustnessAdversarial Attack AssessmentSpeech Recognition Technology 2017.07.17 2025.05.28 Literature Database
Foolbox: A Python toolbox to benchmark the robustness of machine learning models Authors: Jonas Rauber, Wieland Brendel, Matthias Bethge | Published: 2017-07-13 | Updated: 2018-03-20 Framework SupportCertified Robustnessrobustness requirements 2017.07.13 2025.05.28 Literature Database
Process Monitoring on Sequences of System Call Count Vectors Authors: Michael Dymshits, Ben Myara, David Tolpin | Published: 2017-07-12 Data CollectionMachine Learning ApplicationAnomaly Detection Algorithm 2017.07.12 2025.05.28 Literature Database
NO Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles Authors: Jiajun Lu, Hussein Sibai, Evan Fabry, David Forsyth | Published: 2017-07-12 Adversarial ExampleAdversarial Example DetectionImage Processing 2017.07.12 2025.05.28 Literature Database
A Survey on Resilient Machine Learning Authors: Atul Kumar, Sameep Mehta | Published: 2017-07-11 Model InversionCertified RobustnessModel Extraction Attack 2017.07.11 2025.05.28 Literature Database