Literature Database

Deep-RBF Networks Revisited: Robust Classification with Rejection

Authors: Pourya Habib Zadeh, Reshad Hosseini, Suvrit Sra | Published: 2018-12-07
Certified Robustness
Experimental Validation
Adversarial Example

Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach

Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal | Published: 2018-12-07
Attack Method
Adversarial Example Detection
Defense Effectiveness Analysis

Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks

Authors: Amir Moradibaad, Ramin Jalilian Mashhoud | Published: 2018-12-07 | Updated: 2018-12-13
Malware Detection
Research Methodology
Selection Method

Three Tools for Practical Differential Privacy

Authors: Koen Lennart van der Veen, Ruben Seggers, Peter Bloem, Giorgio Patrini | Published: 2018-12-07
Hyperparameter Optimization
Performance Evaluation
Differential Privacy

Adversarial Attacks, Regression, and Numerical Stability Regularization

Authors: Andre T. Nguyen, Edward Raff | Published: 2018-12-07
Robust Regression
Adversarial Example
Defense Effectiveness Analysis

Privacy Partitioning: Protecting User Data During the Deep Learning Inference Phase

Authors: Jianfeng Chi, Emmanuel Owusu, Xuwang Yin, Tong Yu, William Chan, Patrick Tague, Yuan Tian | Published: 2018-12-07
Privacy protection framework
Model Inversion
Attack that Analyzes Images with AI to Infer Personal Information

Knockoff Nets: Stealing Functionality of Black-Box Models

Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2018-12-06
Model Extraction Attack
Medical Image Analysis
Reinforcement Learning

The Limitations of Model Uncertainty in Adversarial Settings

Authors: Kathrin Grosse, David Pfaff, Michael Thomas Smith, Michael Backes | Published: 2018-12-06 | Updated: 2019-11-17
Certified Robustness
Robustness Evaluation
Adversarial Example

Prior Networks for Detection of Adversarial Attacks

Authors: Andrey Malinin, Mark Gales | Published: 2018-12-06
Detection of Model Extraction Attacks
Robustness Evaluation
Adversarial Learning

On Configurable Defense against Adversarial Example Attacks

Authors: Bo Luo, Min Li, Yu Li, Qiang Xu | Published: 2018-12-06
Adversarial Example
Adversarial Learning
Defense Method