Machine Learning Technology

Synthesis of Realistic ECG using Generative Adversarial Networks

Authors: Anne Marie Delaney, Eoin Brophy, Tomas E. Ward | Published: 2019-09-19
Signal Analysis
Machine Learning Technology
Generative Adversarial Network

Adversarial Vulnerability Bounds for Gaussian Process Classification

Authors: Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A Alvarez | Published: 2019-09-19
Taxonomy of Attacks
Adversarial Example
Machine Learning Technology

Differentially Private Regression and Classification with Sparse Gaussian Processes

Authors: Michael Thomas Smith, Mauricio A. Alvarez, Neil D. Lawrence | Published: 2019-09-19
Privacy Protection Mechanism
Privacy Classification
Machine Learning Technology

An Empirical Investigation of Randomized Defenses against Adversarial Attacks

Authors: Yannik Potdevin, Dirk Nowotka, Vijay Ganesh | Published: 2019-09-12
Security Analysis
Adversarial Example
Machine Learning Technology

DaiMoN: A Decentralized Artificial Intelligence Model Network

Authors: Surat Teerapittayanon, H. T. Kung | Published: 2019-07-19
Data Generation
Blockchain Integration
Machine Learning Technology

Robust Classification using Robust Feature Augmentation

Authors: Kevin Eykholt, Swati Gupta, Atul Prakash, Amir Rahmati, Pratik Vaishnavi, Haizhong Zheng | Published: 2019-05-26 | Updated: 2019-09-18
Data Augmentation Techniques
Generalization Performance
Machine Learning Technology

Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor

Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren | Published: 2019-05-12
Performance Evaluation
Machine Learning Technology
Multi-Sensor Defense

Beyond Explainability: Leveraging Interpretability for Improved Adversarial Learning

Authors: Devinder Kumar, Ibrahim Ben-Daya, Kanav Vats, Jeffery Feng, Graham Taylor and, Alexander Wong | Published: 2019-04-21
Attack Evaluation
Adversarial Training
Machine Learning Technology

On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26
Adversarial Example Detection
Adversarial Perturbation Techniques
Machine Learning Technology

Clipping free attacks against artificial neural networks

Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28
Adversarial Example Detection
Adversarial Perturbation Techniques
Machine Learning Technology