Literature Database

Houdini: Fooling Deep Structured Prediction Models

Authors: Moustapha Cisse, Yossi Adi, Natalia Neverova, Joseph Keshet | Published: 2017-07-17
Certified Robustness
Adversarial Attack Assessment
Speech Recognition Technology

Foolbox: A Python toolbox to benchmark the robustness of machine learning models

Authors: Jonas Rauber, Wieland Brendel, Matthias Bethge | Published: 2017-07-13 | Updated: 2018-03-20
Framework Support
Certified Robustness
robustness requirements

Process Monitoring on Sequences of System Call Count Vectors

Authors: Michael Dymshits, Ben Myara, David Tolpin | Published: 2017-07-12
Data Collection
Machine Learning Application
Anomaly Detection Algorithm

NO Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles

Authors: Jiajun Lu, Hussein Sibai, Evan Fabry, David Forsyth | Published: 2017-07-12
Adversarial Example
Adversarial Example Detection
Image Processing

A Survey on Resilient Machine Learning

Authors: Atul Kumar, Sameep Mehta | Published: 2017-07-11
Model Inversion
Certified Robustness
Model Extraction Attack

A Machine Learning Based Intrusion Detection System for Software Defined 5G Network

Authors: Jiaqi Li, Zhifeng Zhao, Rongpeng Li | Published: 2017-07-10
Model Performance Evaluation
Random Forest
Machine Learning Method

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2017-06-30
Data Collection
User Behavior Analysis
Anomaly Detection Algorithm

Towards Deep Learning Models Resistant to Adversarial Attacks

Authors: Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, Adrian Vladu | Published: 2017-06-19 | Updated: 2019-09-04
Certified Robustness
Robustness Evaluation
Adversarial Example

Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach

Authors: Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li | Published: 2017-06-13 | Updated: 2017-10-31
Malware Classification
Detection of Poisonous Data
Feature Selection Method

Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway

Authors: Veronica del Carmen Estrada | Published: 2017-06-10
TCP Session Management
Data Collection
Anomaly Detection Algorithm