Literature Database

Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples

Authors: Emilio Rafael Balda, Arash Behboodi, Rudolf Mathar | Published: 2018-12-15
Certified Robustness
Robust Optimization
Adversarial Example Detection

Federated Optimization in Heterogeneous Networks

Authors: Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, Virginia Smith | Published: 2018-12-14 | Updated: 2020-04-21
Optimization Strategy
Deep Learning Method
Federated Learning

Training Set Camouflage

Authors: Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu | Published: 2018-12-13
Data Collection
Application of Text Classification
Improvement of Learning

A 0.16pJ/bit Recurrent Neural Network Based PUF for Enhanced Machine Learning Atack Resistance

Authors: Nimesh Shah, Manaar Alam, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Arindam Basu | Published: 2018-12-13
IoT Traffic Characteristics
Simulation Environment
Robustness

Thwarting Adversarial Examples: An $L_0$-RobustSparse Fourier Transform

Authors: Mitali Bafna, Jack Murtagh, Nikhil Vyas | Published: 2018-12-12
Robustness
Convergence analysis
Adversarial Example Detection

A Style-Based Generator Architecture for Generative Adversarial Networks

Authors: Tero Karras, Samuli Laine, Timo Aila | Published: 2018-12-12 | Updated: 2019-03-29
Data Generation
Deepfake
Image Processing

Recurrent Neural Networks for Fuzz Testing Web Browsers

Authors: Martin Sablotny, Bjørn Sand Jensen, Chris W. Johnson | Published: 2018-12-12
Fuzzing
Deep Learning Model
Generative Adversarial Network

Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection

Authors: Milad Salem, Shayan Taheri, Jiann Shiun Yuan | Published: 2018-12-11
Data Collection
Multi-Class Classification
Generative Adversarial Network

Adversarial Framing for Image and Video Classification

Authors: Konrad Zolna, Michal Zajac, Negar Rostamzadeh, Pedro O. Pinheiro | Published: 2018-12-11 | Updated: 2019-10-17
Adversarial Example Detection
Deep Learning

Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification

Authors: Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jingchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S. Yu | Published: 2018-12-10 | Updated: 2019-05-09
Graph Embedding
Data Collection
Malware Detection Method