Literature Database

Adversarial Robustness through Local Linearization

Authors: Chongli Qin, James Martens, Sven Gowal, Dilip Krishnan, Krishnamurthy Dvijotham, Alhussein Fawzi, Soham De, Robert Stanforth, Pushmeet Kohli | Published: 2019-07-04 | Updated: 2019-10-10
Robustness Evaluation
Adversarial attack
Deep Learning Method

Diffprivlib: The IBM Differential Privacy Library

Authors: Naoise Holohan, Stefano Braghin, Pól Mac Aonghusa, Killian Levacher | Published: 2019-07-04
Privacy Protection
Library Classification
Machine Learning Framework

Capacity Bounded Differential Privacy

Authors: Kamalika Chaudhuri, Jacob Imola, Ashwin Machanavajjhala | Published: 2019-07-03
Privacy Protection
Information Gathering Methods
Research Methodology

Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack

Authors: Francesco Croce, Matthias Hein | Published: 2019-07-03 | Updated: 2020-07-20
Poisoning
Vulnerability of Adversarial Examples
Adversarial attack

A Bayesian Hierarchical Model for Criminal Investigations

Authors: F. O. Bunnin, J. Q. Smith | Published: 2019-07-03 | Updated: 2019-11-05
Task Design
Data Extraction and Analysis
Information Gathering Methods

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

Authors: Ba Dung Le, Guanhua Wang, Mehwish Nasim, Ali Babar | Published: 2019-07-03 | Updated: 2019-09-05
Automation of Cybersecurity
Data Extraction and Analysis
Information Gathering Methods

MimosaNet: An Unrobust Neural Network Preventing Model Stealing

Authors: Kálmán Szentannai, Jalal Al-Afandi, András Horváth | Published: 2019-07-02
DNN IP Protection Method
Adversarial attack
Deep Learning Method

Protecting Privacy of Users in Brain-Computer Interface Applications

Authors: Anisha Agarwal, Rafael Dowsley, Nicholas D. McKinney, Dongrui Wu, Chin-Teng Lin, Martine De Cock, Anderson C. A. Nascimento | Published: 2019-07-02
Secure Logistic Regression
Privacy Protection
Machine Learning Framework

Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts

Authors: Xiaoyu Du, Mark Scanlon | Published: 2019-07-02
Data Extraction and Analysis
Machine Learning Framework
Research Methodology

Treant: Training Evasion-Aware Decision Trees

Authors: Stefano Calzavara, Claudio Lucchese, Gabriele Tolomei, Seyum Assefa Abebe, Salvatore Orlando | Published: 2019-07-02 | Updated: 2019-07-03
Adversarial attack
Optimization Strategy
Machine Learning Framework