Extraction of Complex DNN Models: Real Threat or Boogeyman? Authors: Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan | Published: 2019-10-11 | Updated: 2020-05-27 Out-of-Distribution DetectionModel Design and AccuracyAttack Evaluation 2019.10.11 2025.05.28 Literature Database
Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor | Published: 2019-10-11 Attack EvaluationAdversarial Attack MethodsSpeech Recognition Technology 2019.10.11 2025.05.28 Literature Database
Defending Neural Backdoors via Generative Distribution Modeling Authors: Ximing Qiao, Yukun Yang, Hai Li | Published: 2019-10-10 | Updated: 2019-11-06 Backdoor AttackAttack EvaluationGenerative Adversarial Network 2019.10.10 2025.05.28 Literature Database
Membership Model Inversion Attacks for Deep Networks Authors: Samyadeep Basu, Rauf Izmailov, Chris Mesterharm | Published: 2019-10-09 Attack EvaluationAttackers and Malicious DevicesGenerative Adversarial Network 2019.10.09 2025.05.28 Literature Database
SmoothFool: An Efficient Framework for Computing Smooth Adversarial Perturbations Authors: Ali Dabouei, Sobhan Soleymani, Fariborz Taherkhani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-10-08 Attack EvaluationAdversarial ExampleAdversarial Attack Methods 2019.10.08 2025.05.28 Literature Database
Detecting AI Trojans Using Meta Neural Analysis Authors: Xiaojun Xu, Qi Wang, Huichen Li, Nikita Borisov, Carl A. Gunter, Bo Li | Published: 2019-10-08 | Updated: 2020-10-01 Backdoor AttackPoisoningAttack Evaluation 2019.10.08 2025.05.28 Literature Database
A Case Study on Using Deep Learning for Network Intrusion Detection Authors: Gabriel C. Fernandez, Shouhuai Xu | Published: 2019-10-05 Data CollectionAttack EvaluationMachine Learning Algorithm 2019.10.05 2025.05.28 Literature Database
Adversarial Examples for Cost-Sensitive Classifiers Authors: Gavin S. Hartnett, Andrew J. Lohn, Alexander P. Sedlack | Published: 2019-10-04 PoisoningAttack EvaluationAdversarial Attack Methods 2019.10.04 2025.05.28 Literature Database
False Data Injection Attacks in Internet of Things and Deep Learning enabled Predictive Analytics Authors: Gautam Raj Mode, Prasad Calyam, Khaza Anuarul Hoque | Published: 2019-10-03 | Updated: 2019-12-13 Cyber ThreatAttack EvaluationMachine Learning Algorithm 2019.10.03 2025.05.28 Literature Database
BUZz: BUffer Zones for defending adversarial examples in image classification Authors: Kaleel Mahmood, Phuong Ha Nguyen, Lam M. Nguyen, Thanh Nguyen, Marten van Dijk | Published: 2019-10-03 | Updated: 2020-06-16 PoisoningAttack EvaluationAdversarial Attack Methods 2019.10.03 2025.05.28 Literature Database