Robust Classification using Robust Feature Augmentation Authors: Kevin Eykholt, Swati Gupta, Atul Prakash, Amir Rahmati, Pratik Vaishnavi, Haizhong Zheng | Published: 2019-05-26 | Updated: 2019-09-18 Data Augmentation TechniquesGeneralization PerformanceMachine Learning Technology 2019.05.26 2025.05.28 Literature Database
Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren | Published: 2019-05-12 Performance EvaluationMachine Learning TechnologyMulti-Sensor Defense 2019.05.12 2025.05.28 Literature Database
Beyond Explainability: Leveraging Interpretability for Improved Adversarial Learning Authors: Devinder Kumar, Ibrahim Ben-Daya, Kanav Vats, Jeffery Feng, Graham Taylor and, Alexander Wong | Published: 2019-04-21 Attack EvaluationAdversarial TrainingMachine Learning Technology 2019.04.21 2025.05.28 Literature Database
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26 Adversarial Example DetectionAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.26 2025.05.28 Literature Database
Clipping free attacks against artificial neural networks Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28 Adversarial Example DetectionAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.26 2025.05.28 Literature Database
Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24 Exploratory AttackAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.24 2025.05.28 Literature Database
Explaining Black-box Android Malware Detection Authors: Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2018-03-09 | Updated: 2018-10-29 Machine Learning TechnologyFeature Importance AnalysisStatic Malware Detection 2018.03.09 2025.05.28 Literature Database
Stochastic Activation Pruning for Robust Adversarial Defense Authors: Guneet S. Dhillon, Kamyar Azizzadenesheli, Zachary C. Lipton, Jeremy Bernstein, Jean Kossaifi, Aran Khanna, Anima Anandkumar | Published: 2018-03-05 Adversarial Example DetectionAdversarial LearningMachine Learning Technology 2018.03.05 2025.05.28 Literature Database
Label Sanitization against Label Flipping Poisoning Attacks Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02 Adversarial Attack AnalysisMachine Learning TechnologyDetection of Poisonous Data 2018.03.02 2025.05.28 Literature Database
Online Feature Ranking for Intrusion Detection Systems Authors: Buse Gul Atli, Alexander Jung | Published: 2018-03-01 | Updated: 2018-06-15 ML-Based IDSData Collection MethodMachine Learning Technology 2018.03.01 2025.05.28 Literature Database