Literature Database

Detecting Adversarial Examples via Key-based Network

Authors: Pinlong Zhao, Zhouyu Fu, Ou wu, Qinghua Hu, Jun Wang | Published: 2018-06-02
Adversarial Learning
Adversarial Transferability
Watermark Evaluation

Tokenized Data Markets

Authors: Bharath Ramsundar, Roger Chen, Alok Vasudev, Rob Robbins, Artur Gorokh | Published: 2018-05-31
Data Flow Analysis
Voting Mechanism
Watermark Evaluation

PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks

Authors: Jan Svoboda, Jonathan Masci, Federico Monti, Michael M. Bronstein, Leonidas Guibas | Published: 2018-05-31
Trigger Detection
Adversarial Example Detection
Deep Learning Method

Resisting Adversarial Attacks using Gaussian Mixture Variational Autoencoders

Authors: Partha Ghosh, Arpan Losalka, Michael J Black | Published: 2018-05-31 | Updated: 2018-12-10
Certified Robustness
Loss Function
Adversarial Example

Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations

Authors: Taesung Lee, Benjamin Edwards, Ian Molloy, Dong Su | Published: 2018-05-31 | Updated: 2018-12-13
Certified Robustness
Detection of Model Extraction Attacks
Watermark Evaluation

Sequential Attacks on Agents for Long-Term Adversarial Goals

Authors: Edgar Tretschk, Seong Joon Oh, Mario Fritz | Published: 2018-05-31 | Updated: 2018-07-05
Certified Robustness
Reinforcement Learning
Adversarial Transferability

Greedy Attack and Gumbel Attack: Generating Adversarial Examples for Discrete Data

Authors: Puyudi Yang, Jianbo Chen, Cho-Jui Hsieh, Jane-Ling Wang, Michael I. Jordan | Published: 2018-05-31
Adversarial Transferability
Feature Importance Analysis
Watermark Evaluation

Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks

Authors: Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg | Published: 2018-05-30
Backdoor Detection
Attack Method
Deep Learning

ADAGIO: Interactive Experimentation with Adversarial Attack and Defense for Audio

Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2018-05-30
Adversarial Transferability
Watermark Evaluation

Android Malware Detection based on Factorization Machine

Authors: Chenglin Li, Keith Mills, Rui Zhu, Di Niu, Hongwen Zhang, Husam Kinawi | Published: 2018-05-30 | Updated: 2019-08-13
Cybersecurity
Feature Importance Analysis
Watermark Evaluation