Literature Database

Copycat CNN: Stealing Knowledge by Persuading Confession with Random Non-Labeled Data

Authors: Jacson Rodrigues Correia-Silva, Rodrigo F. Berriel, Claudine Badue, Alberto F. de Souza, Thiago Oliveira-Santos | Published: 2018-06-14
Poisoning
Certified Robustness
Face Recognition System

Manifold Mixup: Better Representations by Interpolating Hidden States

Authors: Vikas Verma, Alex Lamb, Christopher Beckham, Amir Najafi, Ioannis Mitliagkas, Aaron Courville, David Lopez-Paz, Yoshua Bengio | Published: 2018-06-13 | Updated: 2019-05-11
Class Selectivity
Robustness Improvement Method
Deep Learning Technology

Static Malware Detection & Subterfuge: Quantifying the Robustness of Machine Learning and Current Anti-Virus

Authors: William Fleshman, Edward Raff, Richard Zak, Mark McLean, Charles Nicholas | Published: 2018-06-12
Cybersecurity
Taxonomy of Attacks
Adversarial Learning

Defense Against the Dark Arts: An overview of adversarial example security research and future research directions

Authors: Ian Goodfellow | Published: 2018-06-11
Certified Robustness
Adversarial Example
Adversarial Training

An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks

Authors: Majd Latah, Levent Toker | Published: 2018-06-11
FDI Attack Detection Methods
Cybersecurity
Taxonomy of Attacks

TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service

Authors: Amartya Sanyal, Matt J. Kusner, Adrià Gascón, Varun Kanade | Published: 2018-06-09
Certified Robustness
Encrypted Traffic Detection
Deep Learning Technology

Data Synthesis based on Generative Adversarial Networks

Authors: Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim | Published: 2018-06-09 | Updated: 2018-07-02
Privacy Protection Method
Synthetic Data Generation
Loss Term

Discovering Signals from Web Sources to Predict Cyber Attacks

Authors: Palash Goyal, KSM Tozammel Hossain, Ashok Deb, Nazgol Tavabi, Nathan Bartley, Andr'es Abeliuk, Emilio Ferrara, Kristina Lerman | Published: 2018-06-08
Cybersecurity
Information Gathering Methods
Vulnerability Prediction

Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware

Authors: Florian Tramèr, Dan Boneh | Published: 2018-06-08 | Updated: 2019-02-27
Privacy Protection Method
Formal Verification
Deep Learning Technology

Blind Justice: Fairness with Encrypted Sensitive Attributes

Authors: Niki Kilbertus, Adrià Gascón, Matt J. Kusner, Michael Veale, Krishna P. Gummadi, Adrian Weller | Published: 2018-06-08
Privacy Protection Method
Fairness Requirements
Secret Distributed Computation