Literature Database

RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks

Authors: Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras | Published: 2018-12-31
RF Attack Detection Method
Rician Fading Model
Trigger Detection

Hessian-Aware Zeroth-Order Optimization for Black-Box Adversarial Attack

Authors: Haishan Ye, Zhichao Huang, Cong Fang, Chris Junchi Li, Tong Zhang | Published: 2018-12-29 | Updated: 2019-03-20
Machine learning
Convergence analysis
Deep Learning

Adversarial Attack and Defense on Graph Data: A Survey

Authors: Lichao Sun, Yingtong Dou, Carl Yang, Ji Wang, Yixin Liu, Philip S. Yu, Lifang He, Bo Li | Published: 2018-12-26 | Updated: 2022-10-06
Poisoning
Robustness
Adversarial Example

A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples

Authors: Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo | Published: 2018-12-26 | Updated: 2019-12-03
Certified Robustness
Adversarial Example Detection
Speech Recognition Process

PPD: Permutation Phase Defense Against Adversarial Examples in Deep Learning

Authors: Mehdi Jafarnia-Jahromi, Tasmin Chowdhury, Hsin-Tai Wu, Sayandev Mukherjee | Published: 2018-12-25 | Updated: 2020-01-04
Robustness
Adversarial Example Detection
Adversarial Learning

Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks

Authors: Thomas Brunner, Frederik Diehl, Michael Truong Le, Alois Knoll | Published: 2018-12-24 | Updated: 2019-05-05
Certified Robustness
Robustness
Adversarial Example Detection

Increasing the adversarial robustness and explainability of capsule networks with $γ$-capsules

Authors: David Peer, Sebastian Stabinger, Antonio Rodriguez-Sanchez | Published: 2018-12-23 | Updated: 2019-12-05
Multi-Class Classification
Robustness
Deep Learning

Towards resilient machine learning for ransomware detection

Authors: Li Chen, Chih-Yuan Yang, Anindya Paul, Ravi Sahita | Published: 2018-12-21 | Updated: 2019-05-16
Backdoor Detection
Malware Detection Method
Generative Adversarial Network

The future of statistical disclosure control

Authors: Mark Elliot, Josep Domingo-Ferrer | Published: 2018-12-21
Data Collection
Attribute Disclosure Risk
Statistical Methods

On the Activity Privacy of Blockchain for IoT

Authors: Ali Dorri, Clemence Roulin, Raja Jurdak, Salil Kanhere | Published: 2018-12-21 | Updated: 2019-03-14
IoT Traffic Characteristics
User Behavior Analysis
Attack Detection