Literature Database

Lipschitz regularized Deep Neural Networks generalize and are adversarially robust

Authors: Chris Finlay, Jeff Calder, Bilal Abbasi, Adam Oberman | Published: 2018-08-28 | Updated: 2019-09-12
Certified Robustness
Robustness Analysis
Adversarial Learning

Stochastic Combinatorial Ensembles for Defending Against Adversarial Examples

Authors: George A. Adam, Petr Smirnov, David Duvenaud, Benjamin Haibe-Kains, Anna Goldenberg | Published: 2018-08-20 | Updated: 2018-09-08
Robustness Analysis
Adversarial attack
Probability distribution

Reinforcement Learning for Autonomous Defence in Software-Defined Networking

Authors: Yi Han, Benjamin I. P. Rubinstein, Tamas Abraham, Tansu Alpcan, Olivier De Vel, Sarah Erfani, David Hubczenko, Christopher Leckie, Paul Montague | Published: 2018-08-17
Adversarial Learning
Adversarial attack
Automated Response to Attacks in Autonomous Systems

Mitigation of Adversarial Attacks through Embedded Feature Selection

Authors: Ziyi Bao, Luis Muñoz-González, Emil C. Lupu | Published: 2018-08-16
Certified Robustness
Robustness Analysis
Adversarial attack

Distributionally Adversarial Attack

Authors: Tianhang Zheng, Changyou Chen, Kui Ren | Published: 2018-08-16 | Updated: 2018-12-06
Deepfake
Adversarial Learning
Adversarial attack

Anomaly Detection in Cyber Network Data Using a Cyber Language Approach

Authors: Bartley D. Richardson, Benjamin J. Radford, Shawn E. Davis, Keegan Hines, David Pekarek | Published: 2018-08-15
Cybersecurity
Dataset evaluation
Traffic Characteristic Analysis

Mitigating Sybils in Federated Learning Poisoning

Authors: Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh | Published: 2018-08-14 | Updated: 2020-07-15
Poisoning
Robustness Analysis
Adversarial attack

Cache Telepathy: Leveraging Shared Resource Attacks to Learn DNN Architectures

Authors: Mengjia Yan, Christopher Fletcher, Josep Torrellas | Published: 2018-08-14
Hyperparameter Tuning
Model Extraction Attack
Detection of Model Extraction Attacks

Mitigating Location Privacy Attacks on Mobile Devices using Dynamic App Sandboxing

Authors: Sashank Narain, Guevara Noubir | Published: 2018-08-13
Access Control
Traffic Characteristic Analysis
Privacy Design Principles

Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks

Authors: Fan Yang, Zhiyuan Chen | Published: 2018-08-10
Certified Robustness
Robustness Analysis
Adversarial attack