Literature Database

Adversarial Attacks Against Medical Deep Learning Systems

Authors: Samuel G. Finlayson, Hyung Won Chung, Isaac S. Kohane, Andrew L. Beam | Published: 2018-04-15 | Updated: 2019-02-04
Adversarial Learning
Adversarial Attack Analysis
Deep Learning

On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09
Adversarial Example Detection
Adversarial Attack Methods
Watermarking Technology

Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques

Authors: Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac | Published: 2018-04-13
FDI Attack Detection Methods
Performance Evaluation
Anomaly Detection Method

A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content

Authors: Joshua Saxe, Richard Harang, Cody Wild, Hillary Sanders | Published: 2018-04-13
Web Page Content Analysis
Backdoor Detection
Deep Learning

A Grid Based Adversarial Clustering Algorithm

Authors: Wutao Wei, Nikhil Gupta, Bowei Xi | Published: 2018-04-13 | Updated: 2024-11-21
Data Contamination Detection
Adversarial Attack Analysis
Anomaly Detection Method

EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models

Authors: Hyrum S. Anderson, Phil Roth | Published: 2018-04-12 | Updated: 2018-04-16
PE File Format
Dataset evaluation
Static Malware Detection

Machine Learning DDoS Detection for Consumer Internet of Things Devices

Authors: Rohan Doshi, Noah Apthorpe, Nick Feamster | Published: 2018-04-11
Model DoS
IoT Threat Detection in Home Routers
Anomaly Detection Method

IoTSense: Behavioral Fingerprinting of IoT Devices

Authors: Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray | Published: 2018-04-11
User Behavior Analysis
User Behavior Analysis
Communication Analysis

Differentially Private Confidence Intervals for Empirical Risk Minimization

Authors: Yue Wang, Daniel Kifer, Jaewoo Lee | Published: 2018-04-11
Privacy Protection Method
Differential Privacy
Statistical Methods

Universal Successor Representations for Transfer Reinforcement Learning

Authors: Chen Ma, Junfeng Wen, Yoshua Bengio | Published: 2018-04-11
Reinforcement Learning Method
Knowledge Transferability