Machine Learning Method

Purifying Adversarial Perturbation with Adversarially Trained Auto-encoders

Authors: Hebi Li, Qi Xiao, Shixin Tian, Jin Tian | Published: 2019-05-26
Attack Type
Vulnerability of Adversarial Examples
Machine Learning Method

Adversarial Distillation for Ordered Top-k Attacks

Authors: Zekun Zhang, Tianfu Wu | Published: 2019-05-25
Adversarial Example
Vulnerability of Adversarial Examples
Machine Learning Method

Rethinking Softmax Cross-Entropy Loss for Adversarial Robustness

Authors: Tianyu Pang, Kun Xu, Yinpeng Dong, Chao Du, Ning Chen, Jun Zhu | Published: 2019-05-25 | Updated: 2020-02-20
Impact of Generalization
Adversarial Example
Machine Learning Method

Enhancing Adversarial Defense by k-Winners-Take-All

Authors: Chang Xiao, Peilin Zhong, Changxi Zheng | Published: 2019-05-25 | Updated: 2019-10-29
Sparsity Optimization
Vulnerability of Adversarial Examples
Machine Learning Method

Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack

Authors: Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li | Published: 2019-05-09
DDoS Attack
Attack Scenario Analysis
Machine Learning Method

Machine Learning Cryptanalysis of a Quantum Random Number Generator

Authors: Nhan Duy Truong, Jing Yan Haw, Syed Muhamad Assad, Ping Koy Lam, Omid Kavehei | Published: 2019-05-07 | Updated: 2019-05-13
Data Collection Method
Machine Learning Method
Quantum Computing

ZK-GanDef: A GAN based Zero Knowledge Adversarial Training Defense for Neural Networks

Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-04-17
Adversarial Example
Adversarial Learning
Machine Learning Method

Helping IT and OT Defenders Collaborate

Authors: Glenn A. Fink, Penny McKenzie | Published: 2019-04-16
Control Model of CPS
Data Collection
Machine Learning Method

On Machine Learning DoS Attack Identification from Cloud Computing Telemetry

Authors: João Henrique Corrêa, Patrick Marques Ciarelli, Moises R. N. Ribeiro, Rodolfo da Silva Villaca | Published: 2019-04-11
DDoS Attack
Data Collection
Machine Learning Method

Machine Learning in IoT Security: Current Solutions and Future Challenges

Authors: Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain | Published: 2019-03-14
Characteristics of IoT Networks
Machine Learning Method
Deep Learning