Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders Authors: Hebi Li, Qi Xiao, Shixin Tian, Jin Tian | Published: 2019-05-26 Attack TypeVulnerability of Adversarial ExamplesMachine Learning Method 2019.05.26 2025.05.28 Literature Database
Adversarial Distillation for Ordered Top-k Attacks Authors: Zekun Zhang, Tianfu Wu | Published: 2019-05-25 Adversarial ExampleVulnerability of Adversarial ExamplesMachine Learning Method 2019.05.25 2025.05.28 Literature Database
Rethinking Softmax Cross-Entropy Loss for Adversarial Robustness Authors: Tianyu Pang, Kun Xu, Yinpeng Dong, Chao Du, Ning Chen, Jun Zhu | Published: 2019-05-25 | Updated: 2020-02-20 Impact of GeneralizationAdversarial ExampleMachine Learning Method 2019.05.25 2025.05.28 Literature Database
Enhancing Adversarial Defense by k-Winners-Take-All Authors: Chang Xiao, Peilin Zhong, Changxi Zheng | Published: 2019-05-25 | Updated: 2019-10-29 Sparsity OptimizationVulnerability of Adversarial ExamplesMachine Learning Method 2019.05.25 2025.05.28 Literature Database
Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack Authors: Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li | Published: 2019-05-09 DDoS AttackAttack Scenario AnalysisMachine Learning Method 2019.05.09 2025.05.28 Literature Database
Machine Learning Cryptanalysis of a Quantum Random Number Generator Authors: Nhan Duy Truong, Jing Yan Haw, Syed Muhamad Assad, Ping Koy Lam, Omid Kavehei | Published: 2019-05-07 | Updated: 2019-05-13 Data Collection MethodMachine Learning MethodQuantum Computing 2019.05.07 2025.05.28 Literature Database
ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-04-17 Adversarial ExampleAdversarial LearningMachine Learning Method 2019.04.17 2025.05.28 Literature Database
Helping IT and OT Defenders Collaborate Authors: Glenn A. Fink, Penny McKenzie | Published: 2019-04-16 Control Model of CPSData CollectionMachine Learning Method 2019.04.16 2025.05.28 Literature Database
On Machine Learning DoS Attack Identification from Cloud Computing Telemetry Authors: João Henrique Corrêa, Patrick Marques Ciarelli, Moises R. N. Ribeiro, Rodolfo da Silva Villaca | Published: 2019-04-11 DDoS AttackData CollectionMachine Learning Method 2019.04.11 2025.05.28 Literature Database
Machine Learning in IoT Security: Current Solutions and Future Challenges Authors: Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain | Published: 2019-03-14 Characteristics of IoT NetworksMachine Learning MethodDeep Learning 2019.03.14 2025.05.28 Literature Database