Literature Database

A Little Is Enough: Circumventing Defenses For Distributed Learning

Authors: Moran Baruch, Gilad Baruch, Yoav Goldberg | Published: 2019-02-16
Adversarial Learning
Adversarial attack
Adversarial Attack Methods

Mitigation of Adversarial Examples in RF Deep Classifiers Utilizing AutoEncoder Pre-training

Authors: Silvija Kokalj-Filipovic, Rob Miller, Nicholas Chang, Chi Leung Lau | Published: 2019-02-16
Poisoning
Adversarial attack
Adversarial Attack Methods

Adversarial Examples in RF Deep Learning: Detection of the Attack and its Physical Robustness

Authors: Silvija Kokalj-Filipovic, Rob Miller | Published: 2019-02-16
Adversarial Example
Adversarial attack
Adversarial Attack Methods

Can Intelligent Hyperparameter Selection Improve Resistance to Adversarial Examples?

Authors: Cody Burkard, Brent Lagesse | Published: 2019-02-14
Adversarial Example
Adversarial Example Detection
Adversarial Attack Methods

The Odds are Odd: A Statistical Test for Detecting Adversarial Examples

Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-02-13 | Updated: 2019-05-09
Certified Robustness
Adversarial attack
Adversarial Attack Methods

Privacy-Utility Trade-off of Linear Regression under Random Projections and Additive Noise

Authors: Mehrdad Showkatbakhsh, Can Karakus, Suhas Diggavi | Published: 2019-02-13
Differential Privacy
Information-Theoretic Approach
Relative Error Analysis

TensorSCONE: A Secure TensorFlow Framework using Intel SGX

Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12
Performance Evaluation
Threat Model
Watermarking Technology

Adversarial Samples on Android Malware Detection Systems for IoT Systems

Authors: Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani | Published: 2019-02-12
Malware Detection Method
Adversarial Attack Methods
Optimization Strategy

Applications of Machine Learning in Cryptography: A Survey

Authors: Mohammed M. Alani | Published: 2019-02-11
Membership Inference
Taxonomy of Attacks
History of Cryptography

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach

Authors: Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen | Published: 2019-02-11
Graph Construction
Malware Detection Method
Classification Pattern Analysis