Literature Database

Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models

Authors: Pouya Samangouei, Maya Kabkab, Rama Chellappa | Published: 2018-05-17 | Updated: 2018-05-18
Certified Robustness
Information Security
Adversarial Attack Detection

Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning

Authors: Tribhuvanesh Orekondy, Seong Joon Oh, Yang Zhang, Bernt Schiele, Mario Fritz | Published: 2018-05-15 | Updated: 2020-09-13
Privacy-Preserving Machine Learning
Poisoning
User Behavior Analysis

Knowledge Distillation with Adversarial Samples Supporting Decision Boundary

Authors: Byeongho Heo, Minsik Lee, Sangdoo Yun, Jin Young Choi | Published: 2018-05-15 | Updated: 2018-12-14
Adversarial Example
Adversarial Attack Detection
Knowledge Distillation

Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing

Authors: Jingyi Wang, Jun Sun, Peixin Zhang, Xinyu Wang | Published: 2018-05-14 | Updated: 2018-05-17
Certified Robustness
Adversarial Example
Adversarial Attack Detection

AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning

Authors: Jinyuan Jia, Neil Zhenqiang Gong | Published: 2018-05-13 | Updated: 2020-04-13
Privacy Protection Mechanism
Membership Inference
Loss Function

Curriculum Adversarial Training

Authors: Qi-Zhi Cai, Min Du, Chang Liu, Dawn Song | Published: 2018-05-13
Data Curation
Model Robustness
Adversarial Learning

Under the Underground: Predicting Private Interactions in Underground Forums

Authors: Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy | Published: 2018-05-11
Darknet Analysis
Membership Inference
User Behavior Analysis

Novel Deep Learning Model for Traffic Sign Detection Using Capsule Networks

Authors: Amara Dinesh Kumar | Published: 2018-05-11
Data Preprocessing
Performance Evaluation Metrics
Deep Learning Model

Exploiting Unintended Feature Leakage in Collaborative Learning

Authors: Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov | Published: 2018-05-10 | Updated: 2018-11-01
Data Leakage
Membership Inference
Label Inference Attack

Secure Mobile Edge Computing in IoT via Collaborative Online Learning

Authors: Bingcong Li, Tianyi Chen, Georgios B. Giannakis | Published: 2018-05-09
Cybersecurity
Information Security
Attack Detection