Deep Learning Method

Malware Detection using Machine Learning and Deep Learning

Authors: Hemant Rathore, Swati Agarwal, Sanjay K. Sahay, Mohit Sewak | Published: 2019-04-04
Machine Learning Algorithm
Machine Learning Application
Deep Learning Method

Bayesian Differential Privacy for Machine Learning

Authors: Aleksei Triastcyn, Boi Faltings | Published: 2019-01-28 | Updated: 2020-08-19
Privacy Definition
Differential Privacy
Deep Learning Method

Interpretable Complex-Valued Neural Networks for Privacy Protection

Authors: Liyao Xiang, Haotian Ma, Hao Zhang, Yifan Zhang, Jie Ren, Quanshi Zhang | Published: 2019-01-28 | Updated: 2020-01-14
Differential Privacy
Adversarial Example
Deep Learning Method

Improving Adversarial Robustness via Promoting Ensemble Diversity

Authors: Tianyu Pang, Kun Xu, Chao Du, Ning Chen, Jun Zhu | Published: 2019-01-25 | Updated: 2019-05-29
Certified Robustness
Adversarial Learning
Deep Learning Method

Universal Rules for Fooling Deep Neural Networks based Text Classification

Authors: Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2019-01-22 | Updated: 2019-04-03
Trigger Detection
Adversarial Example
Deep Learning Method

A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks — Prevention and Prediction for Combating Terrorism

Authors: Vivek Kumar, Manuel Mazzara, Maj. Gen., Angelo Messina, JooYoung Lee | Published: 2019-01-19 | Updated: 2019-02-21
Terror Attack Data Classification
Model evaluation methods
Deep Learning Method

Federated Optimization in Heterogeneous Networks

Authors: Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, Virginia Smith | Published: 2018-12-14 | Updated: 2020-04-21
Optimization Strategy
Deep Learning Method
Federated Learning

Evidential Deep Learning to Quantify Classification Uncertainty

Authors: Murat Sensoy, Lance Kaplan, Melih Kandemir | Published: 2018-06-05 | Updated: 2018-10-31
Quantification of Uncertainty
Uncertainty Assessment
Deep Learning Method

PeerNets: Exploiting Peer Wisdom Against Adversarial Attacks

Authors: Jan Svoboda, Jonathan Masci, Federico Monti, Michael M. Bronstein, Leonidas Guibas | Published: 2018-05-31
Trigger Detection
Adversarial Example Detection
Deep Learning Method

Two-Stream Neural Networks for Tampered Face Detection

Authors: Peng Zhou, Xintong Han, Vlad I. Morariu, Larry S. Davis | Published: 2018-03-29
Detection of Deepfakes
Performance Evaluation Metrics
Deep Learning Method