Literature Database

Deep Learning in steganography and steganalysis from 2015 to 2018

Authors: Marc Chaumont | Published: 2019-03-31 | Updated: 2019-10-16
Steganography Techniques
Machine Learning Application
Deep Learning-Based IDS

On the Vulnerability of CNN Classifiers in EEG-Based BCIs

Authors: Xiao Zhang, Dongrui Wu | Published: 2019-03-31
Certified Robustness
Adversarial Learning
Adversarial Attack Detection

A Machine Learning Framework for Biometric Authentication using Electrocardiogram

Authors: Song-Kyoo Kim, Chan Yeob Yeun, Ernesto Damiani, Nai-Wei Lo | Published: 2019-03-29 | Updated: 2019-08-05
Data Preprocessing
Signal Processing
Biometric Authentication Technology

Benchmarking Neural Network Robustness to Common Corruptions and Perturbations

Authors: Dan Hendrycks, Thomas Dietterich | Published: 2019-03-28
Robust Optimization
Adversarial Learning
Adversarial Attack Detection

Using Blockchain to Rein in The New Post-Truth World and Check The Spread of Fake News

Authors: Adnan Qayyum, Junaid Qadir, Muhammad Umar Janjua, Falak Sher | Published: 2019-03-28
Detection of Misinformation
Psychological Manipulation
Causes of Information Leakage

Rallying Adversarial Techniques against Deep Learning for Network Security

Authors: Joseph Clements, Yuzhe Yang, Ankur Sharma, Hongxin Hu, Yingjie Lao | Published: 2019-03-27 | Updated: 2021-10-25
Effective Perturbation Methods
Adversarial Learning
Adversarial Attack Detection

Bridging Adversarial Robustness and Gradient Interpretability

Authors: Beomsu Kim, Junghoon Seo, Taegyun Jeon | Published: 2019-03-27 | Updated: 2019-04-19
Certified Robustness
Adversarial Learning
Interpretability

Scaling up the randomized gradient-free adversarial attack reveals overestimation of robustness using established attacks

Authors: Francesco Croce, Jonas Rauber, Matthias Hein | Published: 2019-03-27 | Updated: 2019-09-25
Trigger Detection
Adversarial Learning
Adversarial Attack Detection

A geometry-inspired decision-based attack

Authors: Yujia Liu, Seyed-Mohsen Moosavi-Dezfooli, Pascal Frossard | Published: 2019-03-26
Certified Robustness
Effective Perturbation Methods
Adversarial Attack Detection

Defending against Whitebox Adversarial Attacks via Randomized Discretization

Authors: Yuchen Zhang, Percy Liang | Published: 2019-03-25
Certified Robustness
Effective Perturbation Methods
Adversarial Attack Detection