Defending Neural Backdoors via Generative Distribution Modeling Authors: Ximing Qiao, Yukun Yang, Hai Li | Published: 2019-10-10 | Updated: 2019-11-06 Backdoor AttackAttack EvaluationGenerative Adversarial Network 2019.10.10 2025.05.28 Literature Database
Membership Model Inversion Attacks for Deep Networks Authors: Samyadeep Basu, Rauf Izmailov, Chris Mesterharm | Published: 2019-10-09 Attack EvaluationAttackers and Malicious DevicesGenerative Adversarial Network 2019.10.09 2025.05.28 Literature Database
SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations Authors: Ali Dabouei, Sobhan Soleymani, Fariborz Taherkhani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-10-08 Attack EvaluationAdversarial ExampleAdversarial Attack Methods 2019.10.08 2025.05.28 Literature Database
Detecting AI Trojans Using Meta Neural Analysis Authors: Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li | Published: 2019-10-08 | Updated: 2020-10-01 Backdoor AttackPoisoningAttack Evaluation 2019.10.08 2025.05.28 Literature Database
A Case Study on Using Deep Learning for Network Intrusion Detection Authors: Gabriel C. Fernandez, Shouhuai Xu | Published: 2019-10-05 Data CollectionAttack EvaluationMachine Learning Algorithm 2019.10.05 2025.05.28 Literature Database
Adversarial Examples for Cost-Sensitive Classifiers Authors: Gavin S. Hartnett, Andrew J. Lohn, Alexander P. Sedlack | Published: 2019-10-04 PoisoningAttack EvaluationAdversarial Attack Methods 2019.10.04 2025.05.28 Literature Database
False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics Authors: Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque | Published: 2019-10-03 | Updated: 2019-12-13 Cyber ThreatAttack EvaluationMachine Learning Algorithm 2019.10.03 2025.05.28 Literature Database
BUZz: BUffer Zones for defending adversarial examples in image classification Authors: Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk | Published: 2019-10-03 | Updated: 2020-06-16 PoisoningAttack EvaluationAdversarial Attack Methods 2019.10.03 2025.05.28 Literature Database
A Data Science Approach for Honeypot Detection in Ethereum Authors: Ramiro Camino, Christof Ferreira Torres, Mathis Baden, Radu State | Published: 2019-10-03 | Updated: 2019-12-19 Smart ContractAttack EvaluationMachine Learning Algorithm 2019.10.03 2025.05.28 Literature Database
Piracy Resistant Watermarks for Deep Neural Networks Authors: Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng | Published: 2019-10-02 | Updated: 2020-12-02 Prompt InjectionMembership InferenceAttack Evaluation 2019.10.02 2025.05.28 Literature Database