Literature Database

How Robust are Deep Neural Networks?

Authors: Biswa Sengupta, Karl J. Friston | Published: 2018-04-30
Certified Robustness
Deep Learning-Based IDS
Watermarking Technology

t-DCF: a Detection Cost Function for the Tandem Assessment of Spoofing Countermeasures and Automatic Speaker Verification

Authors: Tomi Kinnunen, Kong Aik Lee, Hector Delgado, Nicholas Evans, Massimiliano Todisco, Md Sahidullah, Junichi Yamagishi, Douglas A. Reynolds | Published: 2018-04-25 | Updated: 2019-04-11
Performance Evaluation Method
Watermarking Technology
Security of Voice Recognition Systems

Query-Efficient Black-Box Attack Against Sequence-Based Malware Classifiers

Authors: Ishai Rosenberg, Asaf Shabtai, Yuval Elovici, Lior Rokach | Published: 2018-04-23 | Updated: 2020-10-03
Query Generation Method
Certified Robustness
Adversarial Attack Methods

Black-box Adversarial Attacks with Limited Queries and Information

Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2018-04-23 | Updated: 2018-07-11
Model Extraction Attack
Adversarial Example
Adversarial Attack Methods

MEADE: Towards a Malicious Email Attachment Detection Engine

Authors: Ethan M. Rudd, Richard Harang, Joshua Saxe | Published: 2018-04-22
Cybersecurity
Attack Method
Adversarial Example Detection

Is feature selection secure against training data poisoning?

Authors: Huang Xiao, Battista Biggio, Gavin Brown, Giorgio Fumera, Claudia Eckert, Fabio Roli | Published: 2018-04-21
Poisoning
Detection of Poisonous Data
Content Specialized for Toxicity Attacks

Gradient Masking Causes CLEVER to Overestimate Adversarial Perturbation Size

Authors: Ian Goodfellow | Published: 2018-04-21
Adversarial Learning
Adversarial Attack Methods
Watermarking Technology

Learning More Robust Features with Adversarial Training

Authors: Shuangtao Li, Yuanke Chen, Yanlin Peng, Lin Bai | Published: 2018-04-20
Adversarial Learning
Adversarial Learning
Watermarking Technology

A Study on Overfitting in Deep Reinforcement Learning

Authors: Chiyuan Zhang, Oriol Vinyals, Remi Munos, Samy Bengio | Published: 2018-04-18 | Updated: 2018-04-20
Training Method
Generalization Performance
Reinforcement Learning Optimization

ShapeShifter: Robust Physical Adversarial Attack on Faster R-CNN Object Detector

Authors: Shang-Tse Chen, Cory Cornelius, Jason Martin, Duen Horng Chau | Published: 2018-04-16 | Updated: 2019-05-01
Faster R-CNN
Certified Robustness
Adversarial Attack Methods