Literature Database

HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples

Authors: Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu | Published: 2018-09-18
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection

Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore | Published: 2018-09-16
Malware Detection
Performance Evaluation Metrics

Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks

Authors: Abhishek Gupta, Zhaoyuan Yang | Published: 2018-09-15
Online Learning
Robustness Improvement Method
Adversarial Attack Methods

Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach

Authors: Mehmet Necip Kurt, Oyetunji Ogundijo, Chong Li, Xiaodong Wang | Published: 2018-09-14
POMDP Problem
Online Learning
State Transition Model

Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks

Authors: Siyue Wang, Xiao Wang, Pu Zhao, Wujie Wen, David Kaeli, Peter Chin, Xue Lin | Published: 2018-09-13
Certified Robustness
Robustness Improvement
Adversarial Example

Query-Efficient Black-Box Attack by Active Learning

Authors: Pengcheng Li, Jinfeng Yi, Lijun Zhang | Published: 2018-09-13
Query Generation Method
Certified Robustness
Adversarial attack

Adversarial Examples: Opportunities and Challenges

Authors: Jiliang Zhang, Chen Li | Published: 2018-09-13 | Updated: 2019-09-23
Certified Robustness
Adversarial Example
Defense Method

Deep Learning in Information Security

Authors: Stefan Thaler, Vlado Menkovski, Milan Petkovic | Published: 2018-09-12
Model Architecture
Certified Robustness
Feature Extraction Method

Poisoning Attacks to Graph-Based Recommender Systems

Authors: Minghong Fang, Guolei Yang, Neil Zhenqiang Gong, Jia Liu | Published: 2018-09-11
Poisoning attack on RAG
Poisoning
Adversarial attack

PUF-AES-PUF: a novel PUF architecture against non-invasive attacks

Authors: Weize Yu, Jia Chen | Published: 2018-09-11
IoT Security
Robustness Improvement Method
Encryption Method