Literature Database

SEALion: a Framework for Neural Network Inference on Encrypted Data

Authors: Tim van Elsloo, Giorgio Patrini, Hamish Ivey-Law | Published: 2019-04-29
Framework
Encryption Method
Deep Learning Technology

Deep pNML: Predictive Normalized Maximum Likelihood for Deep Neural Networks

Authors: Koby Bibas, Yaniv Fogel, Meir Feder | Published: 2019-04-28 | Updated: 2020-01-08
Out-of-Distribution Detection
Robust Estimation
Deep Learning Technology

End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

Authors: Bahram Mohammadi, Mohammad Sabokrou | Published: 2019-04-25
Intrusion Detection System
Deep Learning Technology
Evaluation Method

A Robust Approach for Securing Audio Classification Against Adversarial Attacks

Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-04-24 | Updated: 2019-11-25
Backdoor Attack
Adversarial Example
Adversarial Attack Methods

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna | Published: 2019-04-24
Data Collection Method
Malware Detection
Crime Detection

Detecting ADS-B Spoofing Attacks using Deep Neural Networks

Authors: Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran | Published: 2019-04-22
DNN-based Message Classifier
Data Collection Method
Deep Learning Technology

Galaxy Learning — A Position Paper

Authors: Chao Wu, Jun Xiao, Gang Huang, Fei Wu | Published: 2019-04-22
Blockchain
Blockchain Technology
Distributed Learning Platform

STGAN: A Unified Selective Transfer Network for Arbitrary Image Attribute Editing

Authors: Ming Liu, Yukang Ding, Min Xia, Xiao Liu, Errui Ding, Wangmeng Zuo, Shilei Wen | Published: 2019-04-22
Data Generation
Deepfake
Image Processing

Beyond Explainability: Leveraging Interpretability for Improved Adversarial Learning

Authors: Devinder Kumar, Ibrahim Ben-Daya, Kanav Vats, Jeffery Feng, Graham Taylor and, Alexander Wong | Published: 2019-04-21
Attack Evaluation
Adversarial Training
Machine Learning Technology

Android Malicious Application Classification Using Clustering

Authors: Hemant Rathore, Sanjay K. Sahay, Palash Chaturvedi, Mohit Sewak | Published: 2019-04-21
Dataset Analysis
Malware Detection
Machine Learning Algorithm