Literature Database

A Machine Learning Based Intrusion Detection System for Software Defined 5G Network

Authors: Jiaqi Li, Zhifeng Zhao, Rongpeng Li | Published: 2017-07-10
Model Performance Evaluation
Random Forest
Machine Learning Method

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2017-06-30
Data Collection
User Behavior Analysis
Anomaly Detection Algorithm

Towards Deep Learning Models Resistant to Adversarial Attacks

Authors: Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, Adrian Vladu | Published: 2017-06-19 | Updated: 2019-09-04
Certified Robustness
Robustness Evaluation
Adversarial Example

Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach

Authors: Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li | Published: 2017-06-13 | Updated: 2017-10-31
Malware Classification
Detection of Poisonous Data
Feature Selection Method

Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway

Authors: Veronica del Carmen Estrada | Published: 2017-06-10
TCP Session Management
Data Collection
Anomaly Detection Algorithm

Certified Defenses for Data Poisoning Attacks

Authors: Jacob Steinhardt, Pang Wei Koh, Percy Liang | Published: 2017-06-09 | Updated: 2017-11-24
Poisoning
Optimization Problem
Detection of Poisonous Data

A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization

Authors: Jeffrey Pawlick, Quanyan Zhu | Published: 2017-06-08 | Updated: 2017-10-16
Privacy Protection Mechanism
Privacy Issues
Differential Privacy

Localization of JPEG double compression through multi-domain convolutional neural networks

Authors: Irene Amerini, Tiberio Uricchio, Lamberto Ballan, Roberto Caldelli | Published: 2017-06-06
Data Flow Analysis
Model Architecture
Image Forensics

Adversarial-Playground: A Visualization Suite for Adversarial Sample Generation

Authors: Andrew Norton, Yanjun Qi | Published: 2017-06-06 | Updated: 2017-06-16
Certified Robustness
Attack Type
Adversarial Learning

Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version)

Authors: Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu | Published: 2017-06-03 | Updated: 2017-07-06
Online Learning
Privacy Issues
Feature Selection