Attack Method

Privacy Enhanced Multimodal Neural Representations for Emotion Recognition

Authors: Mimansa Jaiswal, Emily Mower Provost | Published: 2019-10-29
Privacy Management
Attack Method
evaluation metrics

MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection

Authors: Anuj Dubey, Rosario Cammarota, Aydin Aysu | Published: 2019-10-29 | Updated: 2019-12-02
Membership Inference
Attack Method
Effectiveness Analysis of Defense Methods

Active Subspace of Neural Networks: Structural Analysis and Universal Attacks

Authors: Chunfeng Cui, Kaiqi Zhang, Talgat Daulbaev, Julia Gusak, Ivan Oseledets, Zheng Zhang | Published: 2019-10-29 | Updated: 2020-04-29
Risks of Model Compression
Attack Method
Dimensionality Reduction Method

Detection of Adversarial Attacks and Characterization of Adversarial Subspace

Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-10-26
Secure Logistic Regression
Attack Method
Adversarial Example Detection

Feedback Learning for Improving the Robustness of Neural Networks

Authors: Chang Song, Zuoguan Wang, Hai Li | Published: 2019-09-12
Class Imbalance
Attack Method
Adversarial Example

Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences

Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang | Published: 2019-09-12
Sensor State Estimation
Attack Method
Machine Learning Application

Structural Robustness for Deep Learning Architectures

Authors: Carlos Lassance, Vincent Gripon, Jian Tang, Antonio Ortega | Published: 2019-09-11
Attack Method
Machine Learning Application
Machine Learning Method

Sparse and Imperceivable Adversarial Attacks

Authors: Francesco Croce, Matthias Hein | Published: 2019-09-11
Poisoning
Attack Method
Machine Learning Method

PDA: Progressive Data Augmentation for General Robustness of Deep Neural Networks

Authors: Hang Yu, Aishan Liu, Xianglong Liu, Gengchao Li, Ping Luo, Ran Cheng, Jichen Yang, Chongzhi Zhang | Published: 2019-09-11 | Updated: 2020-02-24
Poisoning
Model Robustness
Attack Method

Effectiveness of Adversarial Examples and Defenses for Malware Classification

Authors: Robert Podschwadt, Hassan Takabi | Published: 2019-09-10
Attack Method
Adversarial Example
Adaptive Adversarial Training