Literature Database

Hardening Quantum Machine Learning Against Adversaries

Authors: Nathan Wiebe, Ram Shankar Siva Kumar | Published: 2017-11-17
Detection of Model Extraction Attacks
Approximate Calculation
Quantum Machine Learning

Enhanced Attacks on Defensively Distilled Deep Neural Networks

Authors: Yujia Liu, Weiming Zhang, Shaohua Li, Nenghai Yu | Published: 2017-11-16
Robustness Improvement
Adversarial Example
Adversarial Attack Analysis

The best defense is a good offense: Countering black box attacks by predicting slightly wrong labels

Authors: Yannic Kilcher, Thomas Hofmann | Published: 2017-11-15
Backdoor Detection
Proactive Defense
Certified Robustness

CryptoDL: Deep Neural Networks over Encrypted Data

Authors: Ehsan Hesamifard, Hassan Takabi, Mehdi Ghasemi | Published: 2017-11-14
Differential Privacy
Encryption Technology
Approximate Calculation

Machine vs Machine: Minimax-Optimal Defense Against Adversarial Examples

Authors: Jihun Hamm, Akshay Mehra | Published: 2017-11-12 | Updated: 2018-06-27
Robustness Improvement
Adversarial Learning
Adversarial Attack Analysis

Dynamic Analysis of Executables to Detect and Characterize Malware

Authors: Michael R. Smith, Joe B. Ingram, Christopher C. Lamb, Timothy J. Draelos, Justin E. Doak, James B. Aimone, Conrad D. James | Published: 2017-11-10 | Updated: 2018-09-28
System Call Analysis
Model evaluation methods
Machine Learning Algorithm

p-FP: Extraction, Classification, and Prediction of Website Fingerprints with Deep Learning

Authors: Se Eun Oh, Saikrishna Sunkam, Nicholas Hopper | Published: 2017-11-10 | Updated: 2018-04-02
Multi-Class Classification
Performance Evaluation
Feature Extraction Method

LatentPoison – Adversarial Attacks On The Latent Space

Authors: Antonia Creswell, Anil A. Bharath, Biswa Sengupta | Published: 2017-11-08
Poisoning
Certified Robustness
Adversarial attack

Intriguing Properties of Adversarial Examples

Authors: Ekin D. Cubuk, Barret Zoph, Samuel S. Schoenholz, Quoc V. Le | Published: 2017-11-08
Adversarial Example
Adversarial Learning
Adversarial attack

Towards Developing Network forensic mechanism for Botnet Activities in the IoT based on Machine Learning Techniques

Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Jill Slay | Published: 2017-11-08
Network Forensics
Botnet Detection Method
Machine Learning Application