Literature Database

MagNet: a Two-Pronged Defense against Adversarial Examples

Authors: Dongyu Meng, Hao Chen | Published: 2017-05-25 | Updated: 2017-09-11
Attack Type
Adversarial Example Detection
Effectiveness Analysis of Defense Methods

Detecting Malignant TLS Servers Using Machine Learning Techniques

Authors: Sankalp Bagaria, R. Balaji, B. S. Bindhumadhava | Published: 2017-05-25
Protocol Procedure
Malicious Client
Feature Selection

Anti-spoofing Methods for Automatic SpeakerVerification System

Authors: Galina Lavrentyeva, Sergey Novoselov, Konstantin Simonchik | Published: 2017-05-24
Detection of Deepfakes
Unknown Attack Detection
Speech Recognition System

Audio-replay attack detection countermeasures

Authors: Galina Lavrentyeva, Sergey Novoselov, Egor Malykh, Alexander Kozlov, Oleg Kudashev, Vadim Shchemelinin | Published: 2017-05-24
Gaussian Mixture Model
Model Architecture
Speech Recognition System

Bayesian Compression for Deep Learning

Authors: Christos Louizos, Karen Ullrich, Max Welling | Published: 2017-05-24 | Updated: 2017-11-06
Parameter Identification
Pruning Method
Selection and Evaluation of Optimization Algorithms

LRSE: A Lightweight Efficient Searchable Encryption Scheme using Local and Global Representations

Authors: Ruihui Zhao, Yuanliang Sun, Mizuho Iwaihara | Published: 2017-05-24
Dataset evaluation
Privacy Protection Mechanism
Privacy Issues

Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation

Authors: Matthias Hein, Maksym Andriushchenko | Published: 2017-05-23 | Updated: 2017-11-05
Certified Robustness
Relationship between Robustness and Privacy
Adversarial Learning

Personalized and Private Peer-to-Peer Machine Learning

Authors: Aurélien Bellet, Rachid Guerraoui, Mahsa Taziki, Marc Tommasi | Published: 2017-05-23 | Updated: 2018-02-19
Q-Learning Algorithm
Privacy Protection Mechanism
Differential Privacy

Exponential error rates of SDP for block models: Beyond Grothendieck’s inequality

Authors: Yingjie Fei, Yudong Chen | Published: 2017-05-23
Numerical Stability Issues
Selection and Evaluation of Optimization Algorithms
High-Dimensional Data Analysis

Detecting Adversarial Image Examples in Deep Networks with Adaptive Noise Reduction

Authors: Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiaofeng Wang | Published: 2017-05-23 | Updated: 2019-01-09
FDI Attack Detection Methods
Adversarial Example Detection
Effectiveness Analysis of Defense Methods