Literature Database

Time Series Deinterleaving of DNS Traffic

Authors: Amir Asiaee, Hardik Goel, Shalini Ghosh, Vinod Yegneswaran, Arindam Banerjee | Published: 2018-07-16
Markov Model
Time Series Analysis
State Transition Model

NEUZZ: Efficient Fuzzing with Neural Program Smoothing

Authors: Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2018-07-15 | Updated: 2019-07-12
Training Data Generation
Program Verification
Model Design and Accuracy

Model Reconstruction from Model Explanations

Authors: Smitha Milli, Ludwig Schmidt, Anca D. Dragan, Moritz Hardt | Published: 2018-07-13
Query Diversity
Model Extraction Attack
Model Evaluation

Algorithms that Remember: Model Inversion Attacks and Data Protection Law

Authors: Michael Veale, Reuben Binns, Lilian Edwards | Published: 2018-07-12 | Updated: 2018-10-15
Membership Inference
Model Inversion
Detection of Model Extraction Attacks

Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach

Authors: Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, Cho-Jui Hsieh | Published: 2018-07-12
Model Evaluation
Adversarial attack
Encryption Technology

Differentially-Private “Draw and Discard” Machine Learning

Authors: Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng | Published: 2018-07-11 | Updated: 2018-10-10
Privacy Assessment
Model Evaluation
Differential Privacy

A Simple Unified Framework for Detecting Out-of-Distribution Samples and Adversarial Attacks

Authors: Kimin Lee, Kibok Lee, Honglak Lee, Jinwoo Shin | Published: 2018-07-10 | Updated: 2018-10-27
Model Evaluation
Adversarial Example Detection
Adversarial Learning

A Practical Approach to the Automatic Classification of Security-Relevant Commits

Authors: Antonino Sabetta, Michele Bezzi | Published: 2018-07-06
Automation of Cybersecurity
Data-Driven Vulnerability Assessment
Program Understanding

Implicit Generative Modeling of Random Noise during Training for Adversarial Robustness

Authors: Priyadarshini Panda, Kaushik Roy | Published: 2018-07-05 | Updated: 2019-05-31
Data Generation
Certified Robustness
Adversarial Learning

Blockchain as a Service: A Decentralized and Secure Computing Paradigm

Authors: Gihan J. Mendis, Yifu Wu, Jin Wei, Moein Sabounchi, Rigoberto Roche' | Published: 2018-07-05 | Updated: 2019-09-04
Privacy Assessment
Blockchain Economics
Model Design and Accuracy