Literature Database

Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward

Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2018-09-26
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Neural Networks with Structural Resistance to Adversarial Attacks

Authors: Luca de Alfaro | Published: 2018-09-25
Poisoning
Certified Robustness
Robustness Improvement Method

Fast Geometrically-Perturbed Adversarial Faces

Authors: Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2018-09-24 | Updated: 2018-09-28
Robustness Improvement Method
Adversarial Attack Methods
Generative Model

Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization

Authors: Bao Wang, Alex T. Lin, Wei Zhu, Penghang Yin, Andrea L. Bertozzi, Stanley J. Osher | Published: 2018-09-23 | Updated: 2020-04-29
Certified Robustness
Adversarial Learning
Adversarial Attack Methods

Unrestricted Adversarial Examples

Authors: Tom B. Brown, Nicholas Carlini, Chiyuan Zhang, Catherine Olsson, Paul Christiano, Ian Goodfellow | Published: 2018-09-22
Robustness Improvement Method
Adversarial Attack Methods
Defense Mechanism

Adversarial Recommendation: Attack of the Learned Fake Users

Authors: Konstantina Christakopoulou, Arindam Banerjee | Published: 2018-09-21
Adversarial Example
Adversarial Attack Methods
Generative Model

Adversarial Binaries for Authorship Identification

Authors: Xiaozhu Meng, Barton P. Miller, Somesh Jha | Published: 2018-09-21 | Updated: 2018-11-07
Binary Diversification
Adversarial Learning
Adversarial Attack Methods

Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT

Authors: Meng Shen, Baoli Ma, Liehuang Zhu, Xiaojiang Du, Ke Xu | Published: 2018-09-21
Data Protection Method
Privacy Risk Management
Encryption Method

Playing the Game of Universal Adversarial Perturbations

Authors: Julien Perolat, Mateusz Malinowski, Bilal Piot, Olivier Pietquin | Published: 2018-09-20 | Updated: 2018-09-25
Robustness Improvement Method
Adversarial Learning
Adversarial Attack Methods

Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data

Authors: Simon Duque Anton, Lia Ahrens, Daniel Fraunholz, Hans Dieter Schotten | Published: 2018-09-20
IoT Security
IoT Traffic Characteristics
Anomaly Detection Method