RareGAN: Generating Samples for Rare Classes Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar | Published: 2022-03-20 Active LearningTrade-off AnalysisTraining Data Generation 2022.03.20 2025.05.28 Literature Database
The Dark Side: Security Concerns in Machine Learning for EDA Authors: Zhiyao Xie, Jingyu Pan, Chen-Chia Chang, Yiran Chen | Published: 2022-03-20 Training Data GenerationPrivacy Risk ManagementMalicious Client 2022.03.20 2025.05.28 Literature Database
An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks Authors: Anirudh Yadav, Ashutosh Upadhyay, S. Sharanya | Published: 2022-03-11 Training Data GenerationAdversarial ExampleDefense Method 2022.03.11 2025.05.28 Literature Database
Third-Party Hardware IP Assurance against Trojans through Supervised Learning and Post-processing Authors: Pravin Gaikwad, Jonathan Cruz, Prabuddha Chakraborty, Swarup Bhunia, Tamzidul Hoque | Published: 2021-11-29 Training Data GenerationHardware Trojan DetectionMachine Learning Algorithm 2021.11.29 2025.05.28 Literature Database
Fooling Adversarial Training with Inducing Noise Authors: Zhirui Wang, Yifei Wang, Yisen Wang | Published: 2021-11-19 Training Data GenerationPoisoningAdversarial attack 2021.11.19 2025.05.28 Literature Database
Enhancing Resilience of Deep Learning Networks by Means of Transferable Adversaries Authors: Moritz Seiler, Heike Trautmann, Pascal Kerschke | Published: 2020-05-27 Training Data GenerationAdversarial ExampleDefense Effectiveness Analysis 2020.05.27 2025.05.28 Literature Database
Hidden Trigger Backdoor Attacks Authors: Aniruddha Saha, Akshayvarun Subramanya, Hamed Pirsiavash | Published: 2019-09-30 | Updated: 2019-12-21 Training Data GenerationBackdoor AttackAdversarial attack 2019.09.30 2025.05.28 Literature Database
NEUZZ: Efficient Fuzzing with Neural Program Smoothing Authors: Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2018-07-15 | Updated: 2019-07-12 Training Data GenerationProgram VerificationModel Design and Accuracy 2018.07.15 2025.05.28 Literature Database
Deep Learning for Launching and Mitigating Wireless Jamming Attacks Authors: Tugba Erpek, Yalin E. Sagduyu, Yi Shi | Published: 2018-07-03 | Updated: 2018-12-13 Training Data GenerationAdversarial attackDefense Method 2018.07.03 2025.05.28 Literature Database