Literature Database

Bridging machine learning and cryptography in defence against adversarial attacks

Authors: Olga Taran, Shideh Rezaeifar, Slava Voloshynovskiy | Published: 2018-09-05
Certified Robustness
Detection of Model Extraction Attacks
Robustness Analysis

Adversarial Attacks on Node Embeddings via Graph Poisoning

Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2018-09-04 | Updated: 2019-05-27
Poisoning
Certified Robustness
Robustness Analysis

HASP: A High-Performance Adaptive Mobile Security Enhancement Against Malicious Speech Recognition

Authors: Zirui Xu, Fuxun Yu, Chenchen Liu, Xiang Chen | Published: 2018-09-04
Robustness Improvement Method
Performance Evaluation
Adversarial Example Detection

IoTDots: A Digital Forensics Framework for Smart Environments

Authors: Leonardo Babun, Amit Kumar Sikder, Abbas Acar, A. Selcuk Uluagac | Published: 2018-09-03
FR Detection Mechanism
IoT Security
Crime Detection

Have You Stolen My Model? Evasion Attacks Against Deep Neural Network Watermarking Techniques

Authors: Dorjan Hitaj, Luigi V. Mancini | Published: 2018-09-03
Backdoor Attack
Detection of Model Extraction Attacks
Transparency and Verification

Adversarial Attack Type I: Cheat Classifiers by Significant Changes

Authors: Sanli Tang, Xiaolin Huang, Mingjian Chen, Chengjin Sun, Jie Yang | Published: 2018-09-03 | Updated: 2019-07-22
Trigger Detection
Robustness Analysis
Adversarial Transferability

Machine Learning Methods for Network Intrusion Detection

Authors: Mouhammad Alkasassbeh, Mohammad Almseidin | Published: 2018-09-01
Dataset evaluation
Performance Evaluation
Feature Engineering

MULDEF: Multi-model-based Defense Against Adversarial Examples for Neural Networks

Authors: Siwakorn Srisakaokul, Yuhao Zhang, Zexuan Zhong, Wei Yang, Tao Xie, Bo Li | Published: 2018-08-31 | Updated: 2019-07-27
Model Ensemble
Adversarial Example Detection
Adversarial Learning

Backdoor Embedding in Convolutional Neural Network Models via Invisible Perturbation

Authors: Cong Liao, Haoti Zhong, Anna Squicciarini, Sencun Zhu, David Miller | Published: 2018-08-30
Backdoor Attack
Backdoor Attack Mitigation
Robustness Analysis

VirtualIdentity: Privacy-Preserving User Profiling

Authors: Sisi Wang, Wing-Sea Poon, Golnoosh Farnadi, Caleb Horst, Kebra Thompson, Michael Nickels, Rafael Dowsley, Anderson C. A. Nascimento, Martine De Cock | Published: 2018-08-30
Privacy-Preserving Machine Learning
Feature Engineering
Secret Distributed Computation