Trigger Detection

Universal Rules for Fooling Deep Neural Networks based Text Classification

Authors: Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2019-01-22 | Updated: 2019-04-03
Trigger Detection
Adversarial Example
Deep Learning Method

ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System

Authors: Huangxun Chen, Chenyu Huang, Qianyi Huang, Qian Zhang, Wei Wang | Published: 2019-01-12 | Updated: 2020-01-14
Trigger Detection
Model Evaluation
Adversarial Attack Methods

RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks

Authors: Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras | Published: 2018-12-31
RF Attack Detection Method
Rician Fading Model
Trigger Detection

Reaching Data Confidentiality and Model Accountability on the CalTrain

Authors: Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy | Published: 2018-12-07
Trigger Detection
Performance Evaluation
Federated Learning

MOBIUS: Model-Oblivious Binarized Neural Networks

Authors: Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka | Published: 2018-11-29
Trigger Detection
Privacy-Preserving Machine Learning
Differential Privacy

Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference

Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25
Trigger Detection
Model Performance Evaluation
Encryption Technology

FALCON: A Fourier Transform Based Approach for Fast and Secure Convolutional Neural Network Predictions

Authors: Shaohua Li, Kaiping Xue, Chenkai Ding, Xindi Gao, David S L Wei, Tao Wan, Feng Wu | Published: 2018-11-20
Trigger Detection
Membership Inference
Cryptographic Protocol

Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses

Authors: Thomas A. Hogan, Bhavya Kailkhura | Published: 2018-11-09 | Updated: 2018-11-13
Trigger Detection
Malicious Content Generation
Attack Evaluation

SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters

Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-15
Trigger Detection
Robustness Improvement
Attack Evaluation

RecurJac: An Efficient Recursive Algorithm for Bounding Jacobian Matrix of Neural Networks and Its Applications

Authors: Huan Zhang, Pengchuan Zhang, Cho-Jui Hsieh | Published: 2018-10-28 | Updated: 2019-02-27
Trigger Detection
Mathematical Analysis
Adversarial Learning