Literature Database

Did you hear that? Adversarial Examples Against Automatic Speech Recognition

Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02
Adversarial Attack Methods
Machine Learning Algorithm
Speech Enhancement Technology

A Deep Belief Network Based Machine Learning System for Risky Host Detection

Authors: Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle | Published: 2017-12-29
Risk Management
Performance Evaluation Metrics
Machine Learning Algorithm

Application of Convolutional Neural Network to Predict Airfoil Lift Coefficient

Authors: Yao Zhang, Woong-Je Sung, Dimitri Mavris | Published: 2017-12-29 | Updated: 2018-01-16
Model Design
Machine Learning Algorithm
Machine Learning Framework

An empirical evaluation for the intrusion detection features based on machine learning and feature selection methods

Authors: Mouhammd Alkasassbeh | Published: 2017-12-27
Machine Learning Algorithm
Feature Selection Method
Communication System

Building Robust Deep Neural Networks for Road Sign Detection

Authors: Arkar Min Aung, Yousef Fadila, Radian Gondokaryono, Luis Gonzalez | Published: 2017-12-26
Robustness Improvement Method
Adversarial Example
Adversarial Attack Methods

The Robust Manifold Defense: Adversarial Training using Generative Models

Authors: Ajil Jalal, Andrew Ilyas, Constantinos Daskalakis, Alexandros G. Dimakis | Published: 2017-12-26 | Updated: 2019-07-10
Certified Robustness
Adversarial Example Detection
Adversarial Learning

Towards Measuring Membership Privacy

Authors: Yunhui Long, Vincent Bindschaedler, Carl A. Gunter | Published: 2017-12-25
Privacy Risk Management
Membership Inference
Privacy Protection in Machine Learning

Query-limited Black-box Attacks to Classifiers

Authors: Fnu Suya, Yuan Tian, David Evans, Paolo Papotti | Published: 2017-12-23
Query Generation Method
Adversarial Attack Methods
Machine Learning Algorithm

Differentially Private Federated Learning: A Client Level Perspective

Authors: Robin C. Geyer, Tassilo Klein, Moin Nabi | Published: 2017-12-20 | Updated: 2018-03-01
Client-Side Component
Privacy Protection
Federated Learning

Differentially Private Distributed Learning for Language Modeling Tasks

Authors: Vadim Popov, Mikhail Kudinov, Irina Piontkovskaya, Petr Vytovtov, Alex Nevidomsky | Published: 2017-12-20 | Updated: 2018-03-06
Detection of Poison Data for Backdoor Attacks
Privacy Issues
Differential Privacy