Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes Authors: Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre | Published: 2019-12-19 | Updated: 2021-10-25 Binary DiversificationAdversarial ExampleDeep Learning Technology 2019.12.19 2025.05.28 Literature Database
Error-Correcting Output Codes with Ensemble Diversity for Robust Learning in Neural Networks Authors: Yang Song, Qiyu Kang, Wee Peng Tay | Published: 2019-11-30 | Updated: 2021-05-07 Error-Correcting Neural NetworkMachine LearningDeep Learning Technology 2019.11.30 2025.05.28 Literature Database
Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique Authors: Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza | Published: 2019-10-24 | Updated: 2020-12-26 Performance EvaluationDeep Learning TechnologyImage Feature Extraction 2019.10.24 2025.05.28 Literature Database
An Adaptive Empirical Bayesian Method for Sparse Deep Learning Authors: Wei Deng, Xiao Zhang, Faming Liang, Guang Lin | Published: 2019-10-23 | Updated: 2020-04-13 Convergence GuaranteeOptimization StrategyDeep Learning Technology 2019.10.23 2025.05.28 Literature Database
Robustness properties of Facebook’s ResNeXt WSL models Authors: A. Emin Orhan | Published: 2019-07-17 | Updated: 2019-12-09 Adversarial Attack MethodsDeep Learning TechnologyWatermarking Technology 2019.07.17 2025.05.28 Literature Database
Latent Adversarial Defence with Boundary-guided Generation Authors: Xiaowei Zhou, Ivor W. Tsang, Jie Yin | Published: 2019-07-16 Adversarial ExampleAdversarial Attack MethodsDeep Learning Technology 2019.07.16 2025.05.28 Literature Database
Evaluating Explanation Methods for Deep Learning in Security Authors: Alexander Warnecke, Daniel Arp, Christian Wressnegger, Konrad Rieck | Published: 2019-06-05 | Updated: 2020-04-27 Dataset AnalysisDeep Learning TechnologyExplainability Evaluation 2019.06.05 2025.05.28 Literature Database
Variational Inference for Graph Convolutional Networks in the Absence of Graph Data and Adversarial Settings Authors: Pantelis Elinas, Edwin V. Bonilla, Louis Tiao | Published: 2019-06-05 | Updated: 2020-10-21 Data Extraction and AnalysisPoisoningDeep Learning Technology 2019.06.05 2025.05.28 Literature Database
Adversarial Training is a Form of Data-dependent Operator Norm Regularization Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-06-04 | Updated: 2020-10-23 Adversarial TrainingDeep Learning TechnologyDefense Mechanism 2019.06.04 2025.05.28 Literature Database
SHE: A Fast and Accurate Deep Neural Network for Encrypted Data Authors: Qian Lou, Lei Jiang | Published: 2019-06-01 | Updated: 2019-11-16 Dataset AnalysisDeep Learning TechnologyComputational Efficiency 2019.06.01 2025.05.28 Literature Database