Literature Database

A Training-based Identification Approach to VIN Adversarial Examples

Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18
Robustness Improvement Method
Adversarial Example Detection
Adversarial Attack Methods

ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks

Authors: Mahdi Ahmadi, Alireza Norouzi, S. M. Reza Soroushmehr, Nader Karimi, Kayvan Najarian, Shadrokh Samavi, Ali Emami | Published: 2018-10-16 | Updated: 2018-12-11
Robustness Improvement Method
Performance Evaluation Metrics
Adversarial Learning

Shallow-Deep Networks: Understanding and Mitigating Network Overthinking

Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2018-10-16 | Updated: 2019-05-09
Backdoor Detection
Robustness Improvement Method
Impact of Generalization

Malware triage for early identification of Advanced Persistent Threat activities

Authors: Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti | Published: 2018-10-16
Malware Detection
Performance Evaluation Metrics
Feature Selection Method

Security Matters: A Survey on Adversarial Machine Learning

Authors: Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen | Published: 2018-10-16 | Updated: 2018-10-23
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Adaptive Fraud Detection System Using Dynamic Risk Features

Authors: Huiying Mao, Yung-wen Liu, Yuting Jia, Jay Nanduri | Published: 2018-10-10
FR Detection Mechanism
Online Learning
Impact of Generalization

The Adversarial Attack and Detection under the Fisher Information Metric

Authors: Chenxiao Zhao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang, Chaomin Shen | Published: 2018-10-09 | Updated: 2019-02-09
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Privacy-Preserving Multiparty Learning For Logistic Regression

Authors: Wei Du, Ang Li, Qinghua Li | Published: 2018-10-04
Secure Logistic Regression
Privacy Risk Management
Differential Privacy

Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection

Authors: Jinoh Kim, Caitlin Sim, Jinhwan Choi | Published: 2018-10-03
Data Generation
Anomaly Detection in Logs
Research Methodology

DeepImageSpam: Deep Learning based Image Spam Detection

Authors: Amara Dinesh Kumar, Vinayakumar R, Soman KP | Published: 2018-10-03
Spam Classification Model
Adversarial Example Detection
Research Methodology