Defense-GAN: Protecting Classifiers Against Adversarial Attacks Using Generative Models Authors: Pouya Samangouei, Maya Kabkab, Rama Chellappa | Published: 2018-05-17 | Updated: 2018-05-18 Certified RobustnessInformation SecurityAdversarial Attack Detection 2018.05.17 2025.05.28 Literature Database
Gradient-Leaks: Understanding and Controlling Deanonymization in Federated Learning Authors: Tribhuvanesh Orekondy, Seong Joon Oh, Yang Zhang, Bernt Schiele, Mario Fritz | Published: 2018-05-15 | Updated: 2020-09-13 Privacy-Preserving Machine LearningPoisoningUser Behavior Analysis 2018.05.15 2025.05.28 Literature Database
Knowledge Distillation with Adversarial Samples Supporting Decision Boundary Authors: Byeongho Heo, Minsik Lee, Sangdoo Yun, Jin Young Choi | Published: 2018-05-15 | Updated: 2018-12-14 Adversarial ExampleAdversarial Attack DetectionKnowledge Distillation 2018.05.15 2025.05.28 Literature Database
Detecting Adversarial Samples for Deep Neural Networks through Mutation Testing Authors: Jingyi Wang, Jun Sun, Peixin Zhang, Xinyu Wang | Published: 2018-05-14 | Updated: 2018-05-17 Certified RobustnessAdversarial ExampleAdversarial Attack Detection 2018.05.14 2025.05.28 Literature Database
AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning Authors: Jinyuan Jia, Neil Zhenqiang Gong | Published: 2018-05-13 | Updated: 2020-04-13 Privacy Protection MechanismMembership InferenceLoss Function 2018.05.13 2025.05.28 Literature Database
Curriculum Adversarial Training Authors: Qi-Zhi Cai, Min Du, Chang Liu, Dawn Song | Published: 2018-05-13 Data CurationModel RobustnessAdversarial Learning 2018.05.13 2025.05.28 Literature Database
Under the Underground: Predicting Private Interactions in Underground Forums Authors: Rebekah Overdorf, Carmela Troncoso, Rachel Greenstadt, Damon McCoy | Published: 2018-05-11 Darknet AnalysisMembership InferenceUser Behavior Analysis 2018.05.11 2025.05.28 Literature Database
Novel Deep Learning Model for Traffic Sign Detection Using Capsule Networks Authors: Amara Dinesh Kumar | Published: 2018-05-11 Data PreprocessingPerformance Evaluation MetricsDeep Learning Model 2018.05.11 2025.05.28 Literature Database
Exploiting Unintended Feature Leakage in Collaborative Learning Authors: Luca Melis, Congzheng Song, Emiliano De Cristofaro, Vitaly Shmatikov | Published: 2018-05-10 | Updated: 2018-11-01 Data LeakageMembership InferenceLabel Inference Attack 2018.05.10 2025.05.28 Literature Database
Secure Mobile Edge Computing in IoT via Collaborative Online Learning Authors: Bingcong Li, Tianyi Chen, Georgios B. Giannakis | Published: 2018-05-09 CybersecurityInformation SecurityAttack Detection 2018.05.09 2025.05.28 Literature Database