Contaminant Removal for Android Malware Detection Systems Authors: Lichao Sun, Xiaokai Wei, Jiawei Zhang, Lifang He, Philip S. Yu, Witawas Srisa-an | Published: 2017-11-07 | Updated: 2017-11-14 Dataset GenerationMalware Detection MethodRandom Forest 2017.11.07 2025.05.28 Literature Database
Advanced Analytics for Connected Cars Cyber Security Authors: Matan Levi, Yair Allouche, Aryeh Kontorovich | Published: 2017-11-06 | Updated: 2017-11-08 HMM Model GenerationML-Based IDSDiscussion on Protocol Vulnerabilities and Attack Scenarios 2017.11.06 2025.05.28 Literature Database
Adversarial Frontier Stitching for Remote Neural Network Watermarking Authors: Erwan Le Merrer, Patrick Perez, Gilles Trédan | Published: 2017-11-06 | Updated: 2019-08-07 Adversarial ExampleAdversarial LearningWatermark Design 2017.11.06 2025.05.28 Literature Database
Computer activity learning from system call time series Authors: Curt Hastings, Ronnie Mainieri | Published: 2017-11-06 Clustering methodsTrigger DetectionMalware Detection Method 2017.11.06 2025.05.28 Literature Database
Profile Matching Across Unstructured Online Social Networks: Threats and Countermeasures Authors: Anisa Halimi, Erman Ayday | Published: 2017-11-06 Attack that Analyzes Information Collected from Social Media to Identify Individuals using AIPrivacy AssessmentProfile Matching Attack 2017.11.06 2025.05.28 Literature Database
Towards Reverse-Engineering Black-Box Neural Networks Authors: Seong Joon Oh, Max Augustin, Bernt Schiele, Mario Fritz | Published: 2017-11-06 | Updated: 2018-02-14 Backdoor DetectionMembership InferenceModel Extraction Attack 2017.11.06 2025.05.28 Literature Database
Inference-Based Similarity Search in Randomized Montgomery Domains for Privacy-Preserving Biometric Identification Authors: Yi Wang, Jianwu Wan, Jun Guo, Yiu-Ming Cheung, Pong C Yuen | Published: 2017-11-05 Privacy-Preserving Machine LearningModel Performance EvaluationBiometric Key Generation 2017.11.05 2025.05.28 Literature Database
Implicit Weight Uncertainty in Neural Networks Authors: Nick Pawlowski, Andrew Brock, Matthew C. H. Lee, Martin Rajchl, Ben Glocker | Published: 2017-11-03 | Updated: 2018-05-25 RobustnessAdversarial LearningMachine Learning 2017.11.03 2025.05.28 Literature Database
SPARK: Static Program Analysis Reasoning and Retrieving Knowledge Authors: Wasuwee Sodsong, Bernhard Scholz, Sanjay Chawla | Published: 2017-11-03 Security Analysis MethodMachine LearningKnowledge Extraction Method 2017.11.03 2025.05.28 Literature Database
Provable defenses against adversarial examples via the convex outer adversarial polytope Authors: Eric Wong, J. Zico Kolter | Published: 2017-11-02 | Updated: 2018-06-08 Certified RobustnessRobustnessDeep Learning Technology 2017.11.02 2025.05.28 Literature Database