Literature Database

Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization

Authors: Daniel Jakubovitz, Raja Giryes | Published: 2018-03-23 | Updated: 2019-05-28
Certified Robustness
Adversarial Learning
Regularization

Robust Blind Deconvolution via Mirror Descent

Authors: Sathya N. Ravi, Ronak Mehta, Vikas Singh | Published: 2018-03-21
Robustness Analysis
Convergence Property
Machine Learning Method

Adversarial Defense based on Structure-to-Signal Autoencoders

Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21
Poisoning
Adversarial Learning
Image Feature Extraction

Resilient Monotone Sequential Maximization

Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16
Resource Consumption Analysis
Reinforcement Learning Algorithm
Machine Learning Method

Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks

Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş | Published: 2018-03-19 | Updated: 2019-03-08
Performance Evaluation Metrics
Adversarial Example
Adversarial Learning

Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks

Authors: Majd Latah, Levent Toker | Published: 2018-03-18 | Updated: 2018-08-19
FDI Attack Detection Methods
Machine Learning Method
evaluation metrics

Adversarial Logit Pairing

Authors: Harini Kannan, Alexey Kurakin, Ian Goodfellow | Published: 2018-03-16
Certified Robustness
Adversarial Learning
Machine Learning Method

Vulnerability of Deep Learning

Authors: Richard Kenway | Published: 2018-03-16
Convergence Property
Adversarial Example
Adversarial Learning

Chiron: Privacy-preserving Machine Learning as a Service

Authors: Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel | Published: 2018-03-15
Distributed Learning
Differential Privacy
Machine Learning Method

Machine learning-assisted virtual patching of web applications

Authors: Gustavo Betarte, Eduardo Giménez, Rodrigo Martínez, Álvaro Pardo | Published: 2018-03-14
Website Vulnerability
Attack Scenario Analysis
Machine Learning Method