Literature Database

Machine Learning in Cyber-Security – Problems, Challenges and Data Sets

Authors: Idan Amit, John Matherly, William Hewlett, Zhi Xu, Yinnon Meshi, Yigal Weinberger | Published: 2018-12-19 | Updated: 2019-04-22
Data Collection
Malware Detection Method
Information Security

Deep Transfer Learning for Static Malware Classification

Authors: Li Chen | Published: 2018-12-18
Malware Detection Method
Deep Learning
Deep Learning Model

Designing Adversarially Resilient Classifiers using Resilient Feature Engineering

Authors: Kevin Eykholt, Atul Prakash | Published: 2018-12-17
Multi-Class Classification
Certified Robustness
Robustness

Trust Region Based Adversarial Attack on Neural Networks

Authors: Zhewei Yao, Amir Gholami, Peng Xu, Kurt Keutzer, Michael Mahoney | Published: 2018-12-16
Certified Robustness
Robustness
Adversarial Learning

Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples

Authors: Emilio Rafael Balda, Arash Behboodi, Rudolf Mathar | Published: 2018-12-15
Certified Robustness
Robust Optimization
Adversarial Example Detection

Federated Optimization in Heterogeneous Networks

Authors: Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, Virginia Smith | Published: 2018-12-14 | Updated: 2020-04-21
Optimization Strategy
Deep Learning Method
Federated Learning

Training Set Camouflage

Authors: Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu | Published: 2018-12-13
Data Collection
Application of Text Classification
Improvement of Learning

A 0.16pJ/bit Recurrent Neural Network Based PUF for Enhanced Machine Learning Atack Resistance

Authors: Nimesh Shah, Manaar Alam, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Arindam Basu | Published: 2018-12-13
IoT Traffic Characteristics
Simulation Environment
Robustness

Thwarting Adversarial Examples: An $L_0$-RobustSparse Fourier Transform

Authors: Mitali Bafna, Jack Murtagh, Nikhil Vyas | Published: 2018-12-12
Robustness
Convergence analysis
Adversarial Example Detection

A Style-Based Generator Architecture for Generative Adversarial Networks

Authors: Tero Karras, Samuli Laine, Timo Aila | Published: 2018-12-12 | Updated: 2019-03-29
Data Generation
Deepfake
Image Processing