Literature Database

Evading classifiers in discrete domains with provable optimality guarantees

Authors: Bogdan Kulynych, Jamie Hayes, Nikita Samarin, Carmela Troncoso | Published: 2018-10-25 | Updated: 2019-07-01
Certified Robustness
Performance Evaluation
Adversarial Learning

Law and Adversarial Machine Learning

Authors: Ram Shankar Siva Kumar, David R. O'Brien, Kendra Albert, Salome Vilojen | Published: 2018-10-25 | Updated: 2018-12-05
Digital Forensics
Adversarial Example Detection
Legal Liability

Robust Adversarial Learning via Sparsifying Front Ends

Authors: Soorya Gopalakrishnan, Zhinus Marzi, Metehan Cekic, Upamanyu Madhow, Ramtin Pedarsani | Published: 2018-10-24 | Updated: 2021-05-25
Certified Robustness
Robust Estimation
Adversarial Transferability

Machine Learning for Anomaly Detection and Categorization in Multi-cloud Environments

Authors: Tara Salman, Deval Bhamare, Aiman Erbad, Raj Jain, Mohammed Samaka | Published: 2018-10-23
Multi-Class Classification
Information Security
Attack Detection

One Bit Matters: Understanding Adversarial Examples as the Abuse of Redundancy

Authors: Jingkang Wang, Ruoxi Jia, Gerald Friedland, Bo Li, Costas Spanos | Published: 2018-10-23
Robust Estimation
Adversarial Example Detection
Adversarial Transferability

Sparse DNNs with Improved Adversarial Robustness

Authors: Yiwen Guo, Chao Zhang, Changshui Zhang, Yurong Chen | Published: 2018-10-23 | Updated: 2019-11-06
Impact of Sparsity
Data Curation
Robust Estimation

CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information

Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek | Published: 2018-10-22
Side-Channel Attack
Model Protection Methods
Model Extraction Attack

Malicious Web Domain Identification using Online Credibility and Performance Data by Considering the Class Imbalance Issue

Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Yukun Bao, Yuqing Lin | Published: 2018-10-19
Malware Detection
Performance Evaluation Metrics
Research Methodology

Exploring Adversarial Examples in Malware Detection

Authors: Octavian Suciu, Scott E. Coull, Jeffrey Johns | Published: 2018-10-18 | Updated: 2019-04-13
Poisoning
Adversarial Example
Adversarial Attack Methods

Private Machine Learning in TensorFlow using Secure Computation

Authors: Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, Gavin Uhma | Published: 2018-10-18 | Updated: 2018-10-23
Data Protection Method
Privacy Risk Management
Computational Consistency