Literature Database

Less is More: Culling the Training Set to Improve Robustness of Deep Neural Networks

Authors: Yongshuai Liu, Jiyu Chen, Hao Chen | Published: 2018-01-09 | Updated: 2018-12-08
Certified Robustness
Adversarial Example
Adversarial Attack Detection

Fusion of ANN and SVM Classifiers for Network Attack Detection

Authors: Takwa Omrani, Adel Dallali, Bilgacem Chibani Rhaimi, Jaouhar Fattahi | Published: 2018-01-09 | Updated: 2018-01-10
ML-Based IDS
Data Preprocessing
Machine Learning Method

Spatially Transformed Adversarial Examples

Authors: Chaowei Xiao, Jun-Yan Zhu, Bo Li, Warren He, Mingyan Liu, Dawn Song | Published: 2018-01-08 | Updated: 2018-01-09
Robustness Improvement Method
Adversarial Learning
Adversarial Attack Detection

Generating Adversarial Examples with Adversarial Networks

Authors: Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song | Published: 2018-01-08 | Updated: 2019-02-14
Adversarial Example
Adversarial Learning
Adversarial Attack Detection

Evaluation of Machine Learning Algorithms for Intrusion Detection System

Authors: Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh | Published: 2018-01-08
ML-Based IDS
Data Preprocessing
Machine Learning Method

HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection

Authors: Li Chen, Salmin Sultana, Ravi Sahita | Published: 2018-01-08
Multi-Domain Data Analysis
Dynamic Analysis Method
Machine Learning Method

Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression

Authors: Martin Gubri | Published: 2018-01-06
Certified Robustness
Adversarial Attack Methods
Machine Learning Algorithm

A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition

Authors: Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi | Published: 2018-01-05
User Authentication System
Machine Learning Method
Facial Recognition Technology

Learning from Pseudo-Randomness With an Artificial Neural Network – Does God Play Pseudo-Dice?

Authors: Fenglei Fan, Ge Wang | Published: 2018-01-05
Experimental Validation
Mathematical Analysis
Machine Learning Algorithm

Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System

Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun | Published: 2018-01-03 | Updated: 2018-06-13
Code Generation
Experimental Validation
Machine Learning Algorithm