Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization Authors: Daniel Jakubovitz, Raja Giryes | Published: 2018-03-23 | Updated: 2019-05-28 Certified RobustnessAdversarial LearningRegularization 2018.03.23 2025.05.28 Literature Database
Robust Blind Deconvolution via Mirror Descent Authors: Sathya N. Ravi, Ronak Mehta, Vikas Singh | Published: 2018-03-21 Robustness AnalysisConvergence PropertyMachine Learning Method 2018.03.21 2025.05.28 Literature Database
Adversarial Defense based on Structure-to-Signal Autoencoders Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21 PoisoningAdversarial LearningImage Feature Extraction 2018.03.21 2025.05.28 Literature Database
Resilient Monotone Sequential Maximization Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16 Resource Consumption AnalysisReinforcement Learning AlgorithmMachine Learning Method 2018.03.21 2025.05.28 Literature Database
Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş | Published: 2018-03-19 | Updated: 2019-03-08 Performance Evaluation MetricsAdversarial ExampleAdversarial Learning 2018.03.19 2025.05.28 Literature Database
Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks Authors: Majd Latah, Levent Toker | Published: 2018-03-18 | Updated: 2018-08-19 FDI Attack Detection MethodsMachine Learning Methodevaluation metrics 2018.03.18 2025.05.28 Literature Database
Adversarial Logit Pairing Authors: Harini Kannan, Alexey Kurakin, Ian Goodfellow | Published: 2018-03-16 Certified RobustnessAdversarial LearningMachine Learning Method 2018.03.16 2025.05.28 Literature Database
Vulnerability of Deep Learning Authors: Richard Kenway | Published: 2018-03-16 Convergence PropertyAdversarial ExampleAdversarial Learning 2018.03.16 2025.05.28 Literature Database
Chiron: Privacy-preserving Machine Learning as a Service Authors: Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel | Published: 2018-03-15 Distributed LearningDifferential PrivacyMachine Learning Method 2018.03.15 2025.05.28 Literature Database
Machine learning-assisted virtual patching of web applications Authors: Gustavo Betarte, Eduardo Giménez, Rodrigo Martínez, Álvaro Pardo | Published: 2018-03-14 Website VulnerabilityAttack Scenario AnalysisMachine Learning Method 2018.03.14 2025.05.28 Literature Database