Literature Database

PIDS – A Behavioral Framework for Analysis and Detection of Network Printer Attacks

Authors: Asaf Hecht, Adi Sagi, Yuval Elovici | Published: 2018-06-27
FDI Attack Detection Methods
Data Flow Analysis
Printer Security

Adversarial Distillation of Bayesian Neural Network Posteriors

Authors: Kuan-Chieh Wang, Paul Vicol, James Lucas, Li Gu, Roger Grosse, Richard Zemel | Published: 2018-06-27
Certified Robustness
Adversarial Example
Deep Learning Technology

Detection based Defense against Adversarial Examples from the Steganalysis Point of View

Authors: Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu | Published: 2018-06-21 | Updated: 2018-12-24
Cybersecurity
Adversarial Example Detection
Adversarial Training

Gradient Adversarial Training of Neural Networks

Authors: Ayan Sinha, Zhao Chen, Vijay Badrinarayanan, Andrew Rabinovich | Published: 2018-06-21
Robustness Improvement Method
Adversarial Learning
Adversarial Training

Built-in Vulnerabilities to Imperceptible Adversarial Perturbations

Authors: Thomas Tanay, Jerone T. A. Andrews, Lewis D. Griffin | Published: 2018-06-19 | Updated: 2019-05-07
Certified Robustness
Adversarial Learning
Adversarial Training

Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment

Authors: Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan | Published: 2018-06-19
Cybersecurity
Deep Learning Technology

Privacy Preserving Analytics on Distributed Medical Data

Authors: Marina Blanton, Ah Reum Kang, Subhadeep Karan, Jaroslaw Zola | Published: 2018-06-18
Data Preprocessing
Privacy Protection Method
Differential Privacy

Image classification and retrieval with random depthwise signed convolutional neural networks

Authors: Yunzhe Xue, Usman Roshan | Published: 2018-06-15 | Updated: 2019-03-15
Deep Learning Technology
Image Classification Method

Hardware Trojan Attacks on Neural Networks

Authors: Joseph Clements, Yingjie Lao | Published: 2018-06-14
Trigger Detection
Adversarial Example
Deep Learning Technology

Securing Majority-Attack In Blockchain Using Machine Learning And Algorithmic Game Theory: A Proof of Work

Authors: Somdip Dey | Published: 2018-06-14
Cybersecurity
Fraudulent Transaction
Taxonomy of Attacks