Attack Evaluation

Defending Neural Backdoors via Generative Distribution Modeling

Authors: Ximing Qiao, Yukun Yang, Hai Li | Published: 2019-10-10 | Updated: 2019-11-06
Backdoor Attack
Attack Evaluation
Generative Adversarial Network

Membership Model Inversion Attacks for Deep Networks

Authors: Samyadeep Basu, Rauf Izmailov, Chris Mesterharm | Published: 2019-10-09
Attack Evaluation
Attackers and Malicious Devices
Generative Adversarial Network

SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations

Authors: Ali Dabouei, Sobhan Soleymani, Fariborz Taherkhani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-10-08
Attack Evaluation
Adversarial Example
Adversarial Attack Methods

Detecting AI Trojans Using Meta Neural Analysis

Authors: Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li | Published: 2019-10-08 | Updated: 2020-10-01
Backdoor Attack
Poisoning
Attack Evaluation

A Case Study on Using Deep Learning for Network Intrusion Detection

Authors: Gabriel C. Fernandez, Shouhuai Xu | Published: 2019-10-05
Data Collection
Attack Evaluation
Machine Learning Algorithm

Adversarial Examples for Cost-Sensitive Classifiers

Authors: Gavin S. Hartnett, Andrew J. Lohn, Alexander P. Sedlack | Published: 2019-10-04
Poisoning
Attack Evaluation
Adversarial Attack Methods

False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics

Authors: Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque | Published: 2019-10-03 | Updated: 2019-12-13
Cyber Threat
Attack Evaluation
Machine Learning Algorithm

BUZz: BUffer Zones for defending adversarial examples in image classification

Authors: Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk | Published: 2019-10-03 | Updated: 2020-06-16
Poisoning
Attack Evaluation
Adversarial Attack Methods

A Data Science Approach for Honeypot Detection in Ethereum

Authors: Ramiro Camino, Christof Ferreira Torres, Mathis Baden, Radu State | Published: 2019-10-03 | Updated: 2019-12-19
Smart Contract
Attack Evaluation
Machine Learning Algorithm

Piracy Resistant Watermarks for Deep Neural Networks

Authors: Huiying Li, Emily Wenger, Shawn Shan, Ben Y. Zhao, Haitao Zheng | Published: 2019-10-02 | Updated: 2020-12-02
Prompt Injection
Membership Inference
Attack Evaluation