Two-Stream Neural Networks for Tampered Face Detection Authors: Peng Zhou, Xintong Han, Vlad I. Morariu, Larry S. Davis | Published: 2018-03-29 Detection of DeepfakesPerformance Evaluation MetricsDeep Learning Method 2018.03.29 2025.05.28 Literature Database
Protection against Cloning for Deep Learning Authors: Richard Kenway | Published: 2018-03-29 Detection of Model Extraction AttacksAdversarial attackRobustness of Deep Networks 2018.03.29 2025.05.28 Literature Database
Defending against Adversarial Images using Basis Functions Transformations Authors: Uri Shaham, James Garritano, Yutaro Yamada, Ethan Weinberger, Alex Cloninger, Xiuyuan Cheng, Kelly Stanton, Yuval Kluger | Published: 2018-03-28 | Updated: 2018-04-16 WatermarkingCertified RobustnessAdversarial attack 2018.03.28 2025.05.28 Literature Database
You are your Metadata: Identification and Obfuscation of Social Media Users using Metadata Information Authors: Beatrice Perez, Mirco Musolesi, Gianluca Stringhini | Published: 2018-03-27 | Updated: 2018-05-14 Privacy ProtectionFeature Selection MethodStatistical Analysis 2018.03.27 2025.05.28 Literature Database
Privacy Preserving Machine Learning: Threats and Solutions Authors: Mohammad Al-Rubaie, J. Morris Chang | Published: 2018-03-27 Privacy Enhancing TechnologyDimensionality Reduction Method 2018.03.27 2025.05.28 Literature Database
Hiding in the Crowd: A Massively Distributed Algorithm for Private Averaging with Malicious Adversaries Authors: Pierre Dellenbach, Aurélien Bellet, Jan Ramon | Published: 2018-03-27 Graph PrivacyPrivacy ProtectionDifferential Privacy 2018.03.27 2025.05.28 Literature Database
Bypassing Feature Squeezing by Increasing Adversary Strength Authors: Yash Sharma, Pin-Yu Chen | Published: 2018-03-27 Experimental ValidationAdversarial LearningAdversarial attack 2018.03.27 2025.05.28 Literature Database
Resilient Active Information Gathering with Mobile Robots Authors: Brent Schlotfeldt, Vasileios Tzoumas, Dinesh Thakur, George J. Pappas | Published: 2018-03-26 | Updated: 2018-09-02 Process EnvironmentRobot ControlCommunication Efficiency 2018.03.26 2025.05.28 Literature Database
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26 Adversarial Example DetectionAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.26 2025.05.28 Literature Database
Clipping free attacks against artificial neural networks Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28 Adversarial Example DetectionAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.26 2025.05.28 Literature Database