Privacy-Enhancing Context Authentication from Location-Sensitive Data Authors: Pradip Mainali, Carlton Shepherd, Fabien A. P. Petitcolas | Published: 2019-04-18 | Updated: 2019-07-10 Data Protection MethodPrivacy ProtectionAuthentication Technology 2019.04.18 2025.05.28 Literature Database
Intrusion Detection Mechanism Using Fuzzy Rule Interpolation Authors: Mohammad Almseidin, Szilveszter Kovacs | Published: 2019-04-18 DDoS AttackFuzzy SystemIntrusion Detection System 2019.04.18 2025.05.28 Literature Database
Gotta Catch ‘Em All: Using Honeypots to Catch Adversarial Attacks on Neural Networks Authors: Shawn Shan, Emily Wenger, Bolun Wang, Bo Li, Haitao Zheng, Ben Y. Zhao | Published: 2019-04-18 | Updated: 2020-09-28 Trapdoor DefenseBackdoor AttackAdversarial Transferability 2019.04.18 2025.05.28 Literature Database
ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-04-17 Adversarial ExampleAdversarial LearningMachine Learning Method 2019.04.17 2025.05.28 Literature Database
Defensive Quantization: When Efficiency Meets Robustness Authors: Ji Lin, Chuang Gan, Song Han | Published: 2019-04-17 Adversarial LearningAdversarial Attack DetectionQuantized Neural Network 2019.04.17 2025.05.28 Literature Database
Adversarial Defense Through Network Profiling Based Path Extraction Authors: Yuxian Qiu, Jingwen Leng, Cong Guo, Quan Chen, Chao Li, Minyi Guo, Yuhao Zhu | Published: 2019-04-17 | Updated: 2019-05-09 Model Performance EvaluationAdversarial Attack DetectionDeep Learning 2019.04.17 2025.05.28 Literature Database
Helping IT and OT Defenders Collaborate Authors: Glenn A. Fink, Penny McKenzie | Published: 2019-04-16 Control Model of CPSData CollectionMachine Learning Method 2019.04.16 2025.05.28 Literature Database
Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction Authors: Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim | Published: 2019-04-15 Adversarial LearningAdversarial Attack DetectionDeep Learning 2019.04.15 2025.05.28 Literature Database
CryptoNN: Training Neural Networks over Encrypted Data Authors: Runhua Xu, James B. D. Joshi, Chao Li | Published: 2019-04-15 | Updated: 2019-04-26 Data Protection MethodPrivacy Protection MethodCryptography 2019.04.15 2025.05.28 Literature Database
Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks Authors: David J. Miller, Zhen Xiang, George Kesidis | Published: 2019-04-12 | Updated: 2019-12-02 Backdoor AttackPoisoningAdversarial Attack Detection 2019.04.12 2025.05.28 Literature Database