Improving Botnet Detection with Recurrent Neural Network and Transfer Learning Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu, Jaegyoon Hahm | Published: 2021-04-26 PoisoningBotnet DetectionTransfer Learning 2021.04.26 2025.05.28 Literature Database
Launching Adversarial Attacks against Network Intrusion Detection Systems for IoT Authors: Pavlos Papadopoulos, Oliver Thornewill von Essen, Nikolaos Pitropakis, Christos Chrysoulas, Alexios Mylonas, William J. Buchanan | Published: 2021-04-26 PoisoningMulti-Class ClassificationAdversarial Example Detection 2021.04.26 2025.05.28 Literature Database
Influence Based Defense Against Data Poisoning Attacks in Online Learning Authors: Sanjay Seetharaman, Shubham Malaviya, Rosni KV, Manish Shukla, Sachin Lodha | Published: 2021-04-24 Data Protection MethodPoisoningDefense Mechanism 2021.04.24 2025.05.28 Literature Database
SPECTRE: Defending Against Backdoor Attacks Using Robust Statistics Authors: Jonathan Hayase, Weihao Kong, Raghav Somani, Sewoong Oh | Published: 2021-04-22 Backdoor AttackPoisoningPoisoning Attack 2021.04.22 2025.05.28 Literature Database
Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks Authors: Simon Mandlik, Tomas Pevny | Published: 2021-04-19 | Updated: 2022-06-08 PoisoningModel DesignMachine Learning Technology 2021.04.19 2025.05.28 Literature Database
Defending Against Adversarial Denial-of-Service Data Poisoning Attacks Authors: Nicolas M. Müller, Simon Roschmann, Konstantin Böttinger | Published: 2021-04-14 | Updated: 2021-11-30 Backdoor AttackPoisoningPoisoning Attack 2021.04.14 2025.05.28 Literature Database
Towards Causal Federated Learning For Enhanced Robustness and Privacy Authors: Sreya Francis, Irene Tenison, Irina Rish | Published: 2021-04-14 Privacy ProtectionPoisoningThreat Model 2021.04.14 2025.05.28 Literature Database
Sparse Coding Frontend for Robust Neural Networks Authors: Can Bakiskan, Metehan Cekic, Ahmet Dundar Sezer, Upamanyu Madhow | Published: 2021-04-12 PoisoningAdversarial Example DetectionDefense Mechanism 2021.04.12 2025.05.28 Literature Database
Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models Authors: Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath | Published: 2021-04-05 PoisoningWatermarking Settings for Medical DataThreat Model 2021.04.05 2025.05.28 Literature Database
Attribution of Gradient Based Adversarial Attacks for Reverse Engineering of Deceptions Authors: Michael Goebel, Jason Bunk, Srinjoy Chattopadhyay, Lakshmanan Nataraj, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-03-19 Data Extraction and AnalysisPoisoningAdversarial Attack Methods 2021.03.19 2025.05.28 Literature Database