Literature Database

Adversarial Perturbations Against Real-Time Video Classification Systems

Authors: Shasha Li, Ajaya Neupane, Sujoy Paul, Chengyu Song, Srikanth V. Krishnamurthy, Amit K. Roy Chowdhury, Ananthram Swami | Published: 2018-07-02
Dual-Purpose Universal Perturbations
Effective Perturbation Methods
Adversarial Example

Adversarial Examples in Deep Learning: Characterization and Divergence

Authors: Wenqi Wei, Ling Liu, Margaret Loper, Stacey Truex, Lei Yu, Mehmet Emre Gursoy, Yanzhao Wu | Published: 2018-06-29 | Updated: 2018-12-30
Loss Function
Attack Evaluation
Adversarial Learning

Adversarial Reprogramming of Neural Networks

Authors: Gamaleldin F. Elsayed, Ian Goodfellow, Jascha Sohl-Dickstein | Published: 2018-06-28 | Updated: 2018-11-29
Certified Robustness
Adversarial Example
Watermark

Towards Demystifying Membership Inference Attacks

Authors: Stacey Truex, Ling Liu, Mehmet Emre Gursoy, Lei Yu, Wenqi Wei | Published: 2018-06-28 | Updated: 2019-02-01
Membership Inference
Attack Scenario Analysis
Adversarial Learning

PIDS – A Behavioral Framework for Analysis and Detection of Network Printer Attacks

Authors: Asaf Hecht, Adi Sagi, Yuval Elovici | Published: 2018-06-27
FDI Attack Detection Methods
Data Flow Analysis
Printer Security

Adversarial Distillation of Bayesian Neural Network Posteriors

Authors: Kuan-Chieh Wang, Paul Vicol, James Lucas, Li Gu, Roger Grosse, Richard Zemel | Published: 2018-06-27
Certified Robustness
Adversarial Example
Deep Learning Technology

Detection based Defense against Adversarial Examples from the Steganalysis Point of View

Authors: Jiayang Liu, Weiming Zhang, Yiwei Zhang, Dongdong Hou, Yujia Liu, Hongyue Zha, Nenghai Yu | Published: 2018-06-21 | Updated: 2018-12-24
Cybersecurity
Adversarial Example Detection
Adversarial Training

Gradient Adversarial Training of Neural Networks

Authors: Ayan Sinha, Zhao Chen, Vijay Badrinarayanan, Andrew Rabinovich | Published: 2018-06-21
Robustness Improvement Method
Adversarial Learning
Adversarial Training

Built-in Vulnerabilities to Imperceptible Adversarial Perturbations

Authors: Thomas Tanay, Jerone T. A. Andrews, Lewis D. Griffin | Published: 2018-06-19 | Updated: 2019-05-07
Certified Robustness
Adversarial Learning
Adversarial Training

Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment

Authors: Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan | Published: 2018-06-19
Cybersecurity
Deep Learning Technology