Literature Database

Learning Universal Adversarial Perturbations with Generative Models

Authors: Jamie Hayes, George Danezis | Published: 2017-08-17 | Updated: 2018-01-05
Certified Robustness
Attack Method
Adversarial Example

Continuous User Authentication via Unlabeled Phone Movement Patterns

Authors: Rajesh Kumar, Partha Pratim Kundu, Diksha Shukla, Vir V. Phoha | Published: 2017-08-15
Data Collection Method
Model Performance Evaluation
User Behavior Analysis

ZOO: Zeroth Order Optimization based Black-box Attacks to Deep Neural Networks without Training Substitute Models

Authors: Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh | Published: 2017-08-14 | Updated: 2017-11-02
Poisoning
Certified Robustness
Attack Method

Cascade Adversarial Machine Learning Regularized with a Unified Embedding

Authors: Taesik Na, Jong Hwan Ko, Saibal Mukhopadhyay | Published: 2017-08-08 | Updated: 2018-03-17
Robustness Analysis
Attack Method
Adversarial Learning

Fake News Detection on Social Media: A Data Mining Perspective

Authors: Kai Shu, Amy Sliva, Suhang Wang, Jiliang Tang, Huan Liu | Published: 2017-08-07 | Updated: 2017-09-03
Dissemination of Misinformation on SNS
User Behavior Analysis
Detection of Misinformation

Adversarial-Playground: A Visualization Suite Showing How Adversarial Examples Fool Deep Learning

Authors: Andrew P. Norton, Yanjun Qi | Published: 2017-08-01
Educational Approach
Adversarial Example
Image Classification Method

Quantum Privacy-Preserving Perceptron

Authors: Shenggang Ying, Mingsheng Ying, Yuan Feng | Published: 2017-07-31
Privacy Enhancing Technology
Differential Privacy
Quantum Computing Method

Predicting Exploitation of Disclosed Software Vulnerabilities Using Open-source Data

Authors: Benjamin L. Bullough, Anna K. Yanchenko, Christopher L. Smith, Joseph R. Zipkin | Published: 2017-07-25
Bias in Training Data
Information Security
Machine Learning Framework

Desensitized RDCA Subspaces for Compressive Privacy in Machine Learning

Authors: Artur Filipowicz, Thee Chanyaswad, S. Y. Kung | Published: 2017-07-24
Data Origins and Evolution
Privacy Enhancing Technology
Privacy Technique

Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers

Authors: Ishai Rosenberg, Asaf Shabtai, Lior Rokach, Yuval Elovici | Published: 2017-07-19 | Updated: 2018-06-24
Backdoor Attack
Dataset for Malware Classification
Certified Robustness