Literature Database

Clonability of anti-counterfeiting printable graphical codes: a machine learning approach

Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy | Published: 2019-03-18
Performance Evaluation
Adversarial Attack Detection
Deep Learning Model

Generating Adversarial Examples With Conditional Generative Adversarial Net

Authors: Ping Yu, Kaitao Song, Jianfeng Lu | Published: 2019-03-18
Certified Robustness
Adversarial Example
Adversarial Attack Detection

Adversarial Attacks on Deep Neural Networks for Time Series Classification

Authors: Hassan Ismail Fawaz, Germain Forestier, Jonathan Weber, Lhassane Idoumghar, Pierre-Alain Muller | Published: 2019-03-17 | Updated: 2019-04-26
Adversarial Example
Adversarial Learning
Adversarial Attack Detection

SLSGD: Secure and Efficient Distributed On-device Machine Learning

Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta | Published: 2019-03-16 | Updated: 2019-10-01
SGD Characteristics
Robust Optimization
Federated Learning

GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection

Authors: Quoc Phong Nguyen, Kar Wai Lim, Dinil Mon Divakaran, Kian Hsiang Low, Mun Choon Chan | Published: 2019-03-15
Spam Detection Method
Botnet Traffic
Feature Extraction Method

A Research Agenda: Dynamic Models to Defend Against Correlated Attacks

Authors: Ian Goodfellow | Published: 2019-03-14
Certified Robustness
Dynamic Service Scheduling
Adversarial Attack Methods

Attribution-driven Causal Analysis for Detection of Adversarial Examples

Authors: Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami | Published: 2019-03-14
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Machine Learning in IoT Security: Current Solutions and Future Challenges

Authors: Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain | Published: 2019-03-14
Characteristics of IoT Networks
Machine Learning Method
Deep Learning

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation

Authors: Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang | Published: 2019-03-13
Data Curation
Malware Detection Method
Generalized Poisson Distribution

Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection

Authors: Mahdieh Zabihimayvan, Derek Doran | Published: 2019-03-13
Phishing Detection
Feature Interdependence
Anomaly Detection Method