Excessive Invariance Causes Adversarial Vulnerability Authors: Jörn-Henrik Jacobsen, Jens Behrmann, Richard Zemel, Matthias Bethge | Published: 2018-11-01 | Updated: 2020-07-12 Model InversionAdversarial ExampleAdversarial Training 2018.11.01 2025.05.28 Literature Database
Adversarial Attacks and Defences: A Survey Authors: Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay | Published: 2018-09-28 Model InversionAdversarial ExampleAdversarial Attack Methods 2018.09.28 2025.05.28 Literature Database
Explainable Black-Box Attacks Against Model-based Authentication Authors: Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler | Published: 2018-09-28 XAI (Explainable AI)Model InversionAdversarial Attack Methods 2018.09.28 2025.05.28 Literature Database
Algorithms that Remember: Model Inversion Attacks and Data Protection Law Authors: Michael Veale, Reuben Binns, Lilian Edwards | Published: 2018-07-12 | Updated: 2018-10-15 Membership InferenceModel InversionDetection of Model Extraction Attacks 2018.07.12 2025.05.28 Literature Database
Understanding Membership Inferences on Well-Generalized Learning Models Authors: Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen | Published: 2018-02-13 Privacy Protection MechanismMembership InferenceModel Inversion 2018.02.13 2025.05.28 Literature Database
URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection Authors: Hung Le, Quang Pham, Doyen Sahoo, Steven C. H. Hoi | Published: 2018-02-09 | Updated: 2018-03-02 Membership InferenceModel InversionMachine Learning Method 2018.02.09 2025.05.28 Literature Database
Privacy-Preserving Deep Inference for Rich User Data on The Cloud Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi | Published: 2017-10-04 | Updated: 2017-10-11 Privacy Protection MethodModel InversionFacial Recognition Technology 2017.10.04 2025.05.28 Literature Database
A Survey on Resilient Machine Learning Authors: Atul Kumar, Sameep Mehta | Published: 2017-07-11 Model InversionCertified RobustnessModel Extraction Attack 2017.07.11 2025.05.28 Literature Database