Literature Database

Design of intentional backdoors in sequential models

Authors: Zhaoyuan Yang, Naresh Iyer, Johan Reimann, Nurali Virani | Published: 2019-02-26
Backdoor Attack
Reinforcement Learning Attack
Adversarial Learning

Function Space Particle Optimization for Bayesian Neural Networks

Authors: Ziyu Wang, Tongzheng Ren, Jun Zhu, Bo Zhang | Published: 2019-02-26 | Updated: 2019-05-08
Robustness Evaluation
Convergence Property
Selection and Evaluation of Optimization Algorithms

Adversarial attacks hidden in plain sight

Authors: Jan Philip Göpfert, André Artelt, Heiko Wersing, Barbara Hammer | Published: 2019-02-25 | Updated: 2020-04-26
Backdoor Attack
Robustness Evaluation
Adversarial Learning

Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence

Authors: Yi Han, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah Erfani | Published: 2019-02-25 | Updated: 2020-08-17
Backdoor Attack
Reinforcement Learning Attack
Adversarial Learning

Extracting vehicle sensor signals from CAN logs for driver re-identification

Authors: Szilvia Lestyan, Gergely Acs, Gergely Biczok, Zsolt Szalay | Published: 2019-02-24 | Updated: 2019-10-25
Random Forest
Machine Learning
Vehicle Network

Privacy Preserving Location Data Publishing: A Machine Learning Approach

Authors: Sina Shaham, Ming Ding, Bo Liu, Shuping Dang, Zihuai Lin, Jun Li | Published: 2019-02-24 | Updated: 2019-11-05
Data Anonymization Techniques
Privacy Protection Method
Dynamic Alignment Algorithm

Evaluating Differentially Private Machine Learning in Practice

Authors: Bargav Jayaraman, David Evans | Published: 2019-02-24 | Updated: 2019-08-12
Membership Inference
Differential Privacy
Causes of Information Leakage

Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data

Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23
Performance Evaluation
Phishing Detection
Poisoning

A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks

Authors: Hadi Salman, Greg Yang, Huan Zhang, Cho-Jui Hsieh, Pengchuan Zhang | Published: 2019-02-23 | Updated: 2020-01-10
Certified Robustness
Robustness Evaluation
Adversarial Learning

Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment

Authors: Ziqi Yang, Ee-Chien Chang, Zhenkai Liang | Published: 2019-02-22
Model Inversion
Adversarial Attack Methods
Optimization Methods