Literature Database

Implicit Sensor-based Authentication of Smartphone Users with Smartwatch

Authors: Wei-Han Lee, Ruby Lee | Published: 2017-03-10
Security Analysis
Performance Evaluation
Behavioral Authentication System

Tactics of Adversarial Attack on Deep Reinforcement Learning Agents

Authors: Yen-Chen Lin, Zhang-Wei Hong, Yuan-Hong Liao, Meng-Li Shih, Ming-Yu Liu, Min Sun | Published: 2017-03-08 | Updated: 2019-11-13
Attack Pattern Extraction
Adversarial Example
Defense Mechanism

Generative Poisoning Attack Method Against Neural Networks

Authors: Chaofei Yang, Qing Wu, Hai Li, Yiran Chen | Published: 2017-03-03
Trigger Detection
Poisoning
Generative Model

Differentially Private Bayesian Learning on Distributed Data

Authors: Mikko Heikkilä, Eemil Lagerspetz, Samuel Kaski, Kana Shimizu, Sasu Tarkoma, Antti Honkela | Published: 2017-03-03 | Updated: 2017-05-29
Data Privacy Management
Privacy Protection Mechanism
Differential Privacy