HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples Authors: Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu | Published: 2018-09-18 Robustness Improvement MethodAdversarial ExampleAdversarial Attack Methods 2018.09.18 2025.05.28 Literature Database
Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore | Published: 2018-09-16 Malware DetectionPerformance Evaluation Metrics 2018.09.16 2025.05.28 Literature Database
Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks Authors: Abhishek Gupta, Zhaoyuan Yang | Published: 2018-09-15 Online LearningRobustness Improvement MethodAdversarial Attack Methods 2018.09.15 2025.05.28 Literature Database
Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach Authors: Mehmet Necip Kurt, Oyetunji Ogundijo, Chong Li, Xiaodong Wang | Published: 2018-09-14 POMDP ProblemOnline LearningState Transition Model 2018.09.14 2025.05.28 Literature Database
Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks Authors: Siyue Wang, Xiao Wang, Pu Zhao, Wujie Wen, David Kaeli, Peter Chin, Xue Lin | Published: 2018-09-13 Certified RobustnessRobustness ImprovementAdversarial Example 2018.09.13 2025.05.28 Literature Database
Query-Efficient Black-Box Attack by Active Learning Authors: Pengcheng Li, Jinfeng Yi, Lijun Zhang | Published: 2018-09-13 Query Generation MethodCertified RobustnessAdversarial attack 2018.09.13 2025.05.28 Literature Database
Adversarial Examples: Opportunities and Challenges Authors: Jiliang Zhang, Chen Li | Published: 2018-09-13 | Updated: 2019-09-23 Certified RobustnessAdversarial ExampleDefense Method 2018.09.13 2025.05.28 Literature Database
Deep Learning in Information Security Authors: Stefan Thaler, Vlado Menkovski, Milan Petkovic | Published: 2018-09-12 Model ArchitectureCertified RobustnessFeature Extraction Method 2018.09.12 2025.05.28 Literature Database
Poisoning Attacks to Graph-Based Recommender Systems Authors: Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu | Published: 2018-09-11 Poisoning attack on RAGPoisoningAdversarial attack 2018.09.11 2025.05.28 Literature Database
PUF-AES-PUF: a novel PUF architecture against non-invasive attacks Authors: Weize Yu, Jia Chen | Published: 2018-09-11 IoT SecurityRobustness Improvement MethodEncryption Method 2018.09.11 2025.05.28 Literature Database