Universalization of any adversarial attack using very few test examples Authors: Sandesh Kamath, Amit Deshpande, K V Subrahmanyam, Vineeth N Balasubramanian | Published: 2020-05-18 | Updated: 2022-10-28 Performance Evaluation MetricsAdversarial ExampleDeep Learning Technology 2020.05.18 2025.05.28 Literature Database
Toward Adversarial Robustness by Diversity in an Ensemble of Specialized Deep Neural Networks Authors: Mahdieh Abbasi, Arezoo Rajabi, Christian Gagne, Rakesh B. Bobba | Published: 2020-05-17 Promotion of DiversityPerformance Evaluation MetricsAdversarial Example 2020.05.17 2025.05.28 Literature Database
NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips Authors: Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique | Published: 2020-05-16 Performance Evaluation MetricsMachine Learning MethodDeep Learning Technology 2020.05.16 2025.05.28 Literature Database
Buffered Asynchronous SGD for Byzantine Learning Authors: Yi-Rui Yang, Wu-Jun Li | Published: 2020-03-02 | Updated: 2022-01-31 Training MethodConvergence AnalysisPerformance Evaluation Metrics 2020.03.02 2025.05.28 Literature Database
Learning to Prevent Leakage: Privacy-Preserving Inference in the Mobile Cloud Authors: Shuang Zhang, Liyao Xiang, Congcong Li, Yixuan Wang, Quanshi Zhang, Wei Wang, Bo Li | Published: 2019-12-18 | Updated: 2021-06-15 Privacy ProtectionPerformance Evaluation MetricsDeep Learning Method 2019.12.18 2025.05.28 Literature Database
MimicGAN: Robust Projection onto Image Manifolds with Corruption Mimicking Authors: Rushil Anirudh, Jayaraman J. Thiagarajan, Bhavya Kailkhura, Timo Bremer | Published: 2019-12-16 | Updated: 2020-04-30 Data GenerationRobustnessPerformance Evaluation Metrics 2019.12.16 2025.05.28 Literature Database
Private Federated Learning with Domain Adaptation Authors: Daniel Peterson, Pallika Kanani, Virendra J. Marathe | Published: 2019-12-13 Privacy ProtectionPerformance Evaluation MetricsMachine Learning Technology 2019.12.13 2025.05.28 Literature Database
Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques Authors: Ibrahim Yilmaz, Rahat Masum | Published: 2019-12-10 Data GenerationPerformance Evaluation MetricsMachine Learning Technology 2019.12.10 2025.05.28 Literature Database
Effect of Imbalanced Datasets on Security of Industrial IoT Using Machine Learning Authors: Maede Zolanvari, Marcio A. Teixeira, Raj Jain | Published: 2019-12-02 Imbalanced DatasetPerformance Evaluation MetricsMachine Learning Technology 2019.12.02 2025.05.28 Literature Database
Neurlux: Dynamic Malware Analysis Without Feature Engineering Authors: Chani Jindal, Christopher Salls, Hojjat Aghakhani, Keith Long, Christopher Kruegel, Giovanni Vigna | Published: 2019-10-24 Model ArchitectureDynamic Analysis MethodPerformance Evaluation Metrics 2019.10.24 2025.05.28 Literature Database