Literature Database

Private Selection from Private Candidates

Authors: Jingcheng Liu, Kunal Talwar | Published: 2018-11-19
Differential Privacy
Selection and Evaluation of Optimization Algorithms
Statistical Analysis

How to Use Heuristics for Differential Privacy

Authors: Seth Neel, Aaron Roth, Zhiwei Steven Wu | Published: 2018-11-19
Synthetic Data Generation
Differential Privacy
Selection and Evaluation of Optimization Algorithms

The Taboo Trap: Behavioural Detection of Adversarial Samples

Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21
Backdoor Detection
Encryption Technology
Defense Method

Regularized adversarial examples for model interpretability

Authors: Yoel Shoshan, Vadim Ratner | Published: 2018-11-18 | Updated: 2018-11-21
Certified Robustness
Feature Importance Analysis
Image Classification Interpretation

Prediction of Signal Sequences in Abiotic Stress Inducible Genes from Main Crops by Association Rule Mining

Authors: Un-Hyang Ho, Hye-Ok Kong | Published: 2018-11-18
FR Detection Mechanism
Data Collection
Model Performance Evaluation

Robust Website Fingerprinting Through the Cache Occupancy Channel

Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom | Published: 2018-11-17 | Updated: 2019-02-21
Fingerprinting Method
Attack Evaluation
Defense Method

A note on hyperparameters in black-box adversarial examples

Authors: Jamie Hayes | Published: 2018-11-15
Challenges in IT Security
Properties of Hypergraphs
Adversarial Example Detection

Adversarial Examples from Cryptographic Pseudo-Random Generators

Authors: Sébastien Bubeck, Yin Tat Lee, Eric Price, Ilya Razenshteyn | Published: 2018-11-15
Robustness Improvement
Statistical Hypothesis Testing
Statistical Testing

Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives

Authors: Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, Mahesh Shirole | Published: 2018-11-13
Data Collection
Model Performance Evaluation
Feature Importance Analysis

RadIoT: Radio Communications Intrusion Detection for IoT – A Protocol Independent Approach

Authors: Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre | Published: 2018-11-09
IoT Security
Signal Analysis
Attack Evaluation