A Survey on Unknown Presentation Attack Detection for Fingerprint Authors: Jag Mohan Singh, Ahmed Madhun, Guoqiang Li, Raghavendra Ramachandra | Published: 2020-05-17 AlgorithmMachine Learning Method 2020.05.17 2025.05.28 Literature Database
NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips Authors: Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique | Published: 2020-05-16 Performance Evaluation MetricsMachine Learning MethodDeep Learning Technology 2020.05.16 2025.05.28 Literature Database
Encryption Inspired Adversarial Defense for Visual Classification Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-05-16 Machine Learning AlgorithmMachine Learning MethodDefense Effectiveness Analysis 2020.05.16 2025.05.28 Literature Database
Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness Authors: Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu | Published: 2020-05-15 | Updated: 2020-06-07 AlgorithmMachine Learning AlgorithmMachine Learning Method 2020.05.15 2025.05.28 Literature Database
Heterogeneous Graph Neural Networks for Malicious Account Detection Authors: Ziqi Liu, Chaochao Chen, Xinxing Yang, Jun Zhou, Xiaolong Li, Le Song | Published: 2020-02-27 Graph Neural NetworkGraph PrivacyMachine Learning Method 2020.02.27 2025.05.28 Literature Database
IoT Device Identification Using Deep Learning Authors: Jaidip Kotak, Yuval Elovici | Published: 2020-02-25 Data Management SystemPerformance EvaluationMachine Learning Method 2020.02.25 2025.05.28 Literature Database
Stealing Black-Box Functionality Using The Deep Neural Tree Architecture Authors: Daniel Teitelman, Itay Naeh, Shie Mannor | Published: 2020-02-23 Training Data Extraction MethodTraining MethodMachine Learning Method 2020.02.23 2025.05.28 Literature Database
Practical Fast Gradient Sign Attack against Mammographic Image Classifier Authors: Ibrahim Yilmaz | Published: 2020-01-27 Adversarial LearningAdversarial Attack DetectionMachine Learning Method 2020.01.27 2025.05.28 Literature Database
Secure and Robust Machine Learning for Healthcare: A Survey Authors: Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al-Fuqaha | Published: 2020-01-21 Medical Image AnalysisAdversarial ExampleMachine Learning Method 2020.01.21 2025.05.28 Literature Database
An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks SAD-F: Spark Based Anomaly Detection Framework Authors: Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza | Published: 2020-01-21 | Updated: 2020-02-14 DDoS Attack DetectionNetwork Threat DetectionMachine Learning Method 2020.01.21 2025.05.28 Literature Database