Literature Database

Towards Imperceptible and Robust Adversarial Example Attacks against Neural Networks

Authors: Bo Luo, Yannan Liu, Lingxiao Wei, Qiang Xu | Published: 2018-01-15
Robustness Improvement Method
Adversarial Example
Adversarial Attack Detection

A3T: Adversarially Augmented Adversarial Training

Authors: Akram Erraqabi, Aristide Baratin, Yoshua Bengio, Simon Lacoste-Julien | Published: 2018-01-12
Certified Robustness
Robustness Improvement Method
Adversarial Attack Detection

Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks

Authors: Yongshuai Liu, Jiyu Chen, Hao Chen | Published: 2018-01-09 | Updated: 2018-12-08
Certified Robustness
Adversarial Example
Adversarial Attack Detection

Fusion of ANN and SVM Classifiers for Network Attack Detection

Authors: Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi | Published: 2018-01-09 | Updated: 2018-01-10
ML-Based IDS
Data Preprocessing
Machine Learning Method

Spatially Transformed Adversarial Examples

Authors: Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, Dawn Song | Published: 2018-01-08 | Updated: 2018-01-09
Robustness Improvement Method
Adversarial Learning
Adversarial Attack Detection

Generating Adversarial Examples with Adversarial Networks

Authors: Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song | Published: 2018-01-08 | Updated: 2019-02-14
Adversarial Example
Adversarial Learning
Adversarial Attack Detection

Evaluation of Machine Learning Algorithms for Intrusion Detection System

Authors: Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh | Published: 2018-01-08
ML-Based IDS
Data Preprocessing
Machine Learning Method

HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection

Authors: Li Chen, Salmin Sultana, Ravi Sahita | Published: 2018-01-08
Multi-Domain Data Analysis
Dynamic Analysis Method
Machine Learning Method

Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression

Authors: Martin Gubri | Published: 2018-01-06
Certified Robustness
Adversarial Attack Methods
Machine Learning Algorithm

A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition

Authors: Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi | Published: 2018-01-05
User Authentication System
Machine Learning Method
Facial Recognition Technology