Deep Learning Technology

Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes

Authors: Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre | Published: 2019-12-19 | Updated: 2021-10-25
Binary Diversification
Adversarial Example
Deep Learning Technology

Error-Correcting Output Codes with Ensemble Diversity for Robust Learning in Neural Networks

Authors: Yang Song, Qiyu Kang, Wee Peng Tay | Published: 2019-11-30 | Updated: 2021-05-07
Error-Correcting Neural Network
Machine Learning
Deep Learning Technology

Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique

Authors: Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza | Published: 2019-10-24 | Updated: 2020-12-26
Performance Evaluation
Deep Learning Technology
Image Feature Extraction

An Adaptive Empirical Bayesian Method for Sparse Deep Learning

Authors: Wei Deng, Xiao Zhang, Faming Liang, Guang Lin | Published: 2019-10-23 | Updated: 2020-04-13
Convergence Guarantee
Optimization Strategy
Deep Learning Technology

Robustness properties of Facebook’s ResNeXt WSL models

Authors: A. Emin Orhan | Published: 2019-07-17 | Updated: 2019-12-09
Adversarial Attack Methods
Deep Learning Technology
Watermarking Technology

Latent Adversarial Defence with Boundary-guided Generation

Authors: Xiaowei Zhou, Ivor W. Tsang, Jie Yin | Published: 2019-07-16
Adversarial Example
Adversarial Attack Methods
Deep Learning Technology

Evaluating Explanation Methods for Deep Learning in Security

Authors: Alexander Warnecke, Daniel Arp, Christian Wressnegger, Konrad Rieck | Published: 2019-06-05 | Updated: 2020-04-27
Dataset Analysis
Deep Learning Technology
Explainability Evaluation

Variational Inference for Graph Convolutional Networks in the Absence of Graph Data and Adversarial Settings

Authors: Pantelis Elinas, Edwin V. Bonilla, Louis Tiao | Published: 2019-06-05 | Updated: 2020-10-21
Data Extraction and Analysis
Poisoning
Deep Learning Technology

Adversarial Training is a Form of Data-dependent Operator Norm Regularization

Authors: Kevin Roth, Yannic Kilcher, Thomas Hofmann | Published: 2019-06-04 | Updated: 2020-10-23
Adversarial Training
Deep Learning Technology
Defense Mechanism

SHE: A Fast and Accurate Deep Neural Network for Encrypted Data

Authors: Qian Lou, Lei Jiang | Published: 2019-06-01 | Updated: 2019-11-16
Dataset Analysis
Deep Learning Technology
Computational Efficiency