Literature Database

Two-Stream Neural Networks for Tampered Face Detection

Authors: Peng Zhou, Xintong Han, Vlad I. Morariu, Larry S. Davis | Published: 2018-03-29
Detection of Deepfakes
Performance Evaluation Metrics
Deep Learning Method

Protection against Cloning for Deep Learning

Authors: Richard Kenway | Published: 2018-03-29
Detection of Model Extraction Attacks
Adversarial attack
Robustness of Deep Networks

Defending against Adversarial Images using Basis Functions Transformations

Authors: Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger | Published: 2018-03-28 | Updated: 2018-04-16
Watermarking
Certified Robustness
Adversarial attack

You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information

Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14
Privacy Protection
Feature Selection Method
Statistical Analysis

Privacy Preserving Machine Learning: Threats and Solutions

Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27
Privacy Enhancing Technology
Dimensionality Reduction Method

Hiding in the Crowd: A Massively Distributed Algorithm for Private Averaging with Malicious Adversaries

Authors: Pierre Dellenbach, Aurélien Bellet, Jan Ramon | Published: 2018-03-27
Graph Privacy
Privacy Protection
Differential Privacy

Bypassing Feature Squeezing by Increasing Adversary Strength

Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27
Experimental Validation
Adversarial Learning
Adversarial attack

Resilient Active Information Gathering with Mobile Robots

Authors: Brent Schlotfeldt, Vasileios Tzoumas, Dinesh Thakur, George J. Pappas | Published: 2018-03-26 | Updated: 2018-09-02
Process Environment
Robot Control
Communication Efficiency

On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26
Adversarial Example Detection
Adversarial Perturbation Techniques
Machine Learning Technology

Clipping free attacks against artificial neural networks

Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28
Adversarial Example Detection
Adversarial Perturbation Techniques
Machine Learning Technology