Adversarial Attacks Against Medical Deep Learning Systems Authors: Samuel G. Finlayson, Hyung Won Chung, Isaac S. Kohane, Andrew L. Beam | Published: 2018-04-15 | Updated: 2019-02-04 Adversarial LearningAdversarial Attack AnalysisDeep Learning 2018.04.15 2025.05.28 Literature Database
On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09 Adversarial Example DetectionAdversarial Attack MethodsWatermarking Technology 2018.04.14 2025.05.28 Literature Database
Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques Authors: Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac | Published: 2018-04-13 FDI Attack Detection MethodsPerformance EvaluationAnomaly Detection Method 2018.04.13 2025.05.28 Literature Database
A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content Authors: Joshua Saxe, Richard Harang, Cody Wild, Hillary Sanders | Published: 2018-04-13 Web Page Content AnalysisBackdoor DetectionDeep Learning 2018.04.13 2025.05.28 Literature Database
A Grid Based Adversarial Clustering Algorithm Authors: Wutao Wei, Nikhil Gupta, Bowei Xi | Published: 2018-04-13 | Updated: 2024-11-21 Data Contamination DetectionAdversarial Attack AnalysisAnomaly Detection Method 2018.04.13 2025.05.28 Literature Database
EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models Authors: Hyrum S. Anderson, Phil Roth | Published: 2018-04-12 | Updated: 2018-04-16 PE File FormatDataset evaluationStatic Malware Detection 2018.04.12 2025.05.28 Literature Database
Machine Learning DDoS Detection for Consumer Internet of Things Devices Authors: Rohan Doshi, Noah Apthorpe, Nick Feamster | Published: 2018-04-11 Model DoSIoT Threat Detection in Home RoutersAnomaly Detection Method 2018.04.11 2025.05.28 Literature Database
IoTSense: Behavioral Fingerprinting of IoT Devices Authors: Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray | Published: 2018-04-11 User Behavior AnalysisUser Behavior AnalysisCommunication Analysis 2018.04.11 2025.05.28 Literature Database
Differentially Private Confidence Intervals for Empirical Risk Minimization Authors: Yue Wang, Daniel Kifer, Jaewoo Lee | Published: 2018-04-11 Privacy Protection MethodDifferential PrivacyStatistical Methods 2018.04.11 2025.05.28 Literature Database
Universal Successor Representations for Transfer Reinforcement Learning Authors: Chen Ma, Junfeng Wen, Yoshua Bengio | Published: 2018-04-11 Reinforcement Learning MethodKnowledge Transferability 2018.04.11 2025.05.28 Literature Database