Deep Learning Technology

Are Labels Required for Improving Adversarial Robustness?

Authors: Jonathan Uesato, Jean-Baptiste Alayrac, Po-Sen Huang, Robert Stanforth, Alhussein Fawzi, Pushmeet Kohli | Published: 2019-05-31 | Updated: 2019-12-05
Role of Machine Learning
Deep Learning Technology

L0 Regularization Based Neural Network Design and Compression

Authors: S. Asim Ahmed | Published: 2019-05-31
Optimization Strategy
Deep Learning Method
Deep Learning Technology

Speaker Anonymization Using X-vector and Neural Waveform Models

Authors: Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen, Massimiliano Todisco, Nicholas Evans, Jean-Francois Bonastre | Published: 2019-05-30
Privacy-Preserving Data Mining
Deep Learning Technology
Speech Signal Processing

NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks

Authors: Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, Boqing Gong | Published: 2019-05-01 | Updated: 2019-12-09
Adversarial Example
Adversarial Attack Methods
Deep Learning Technology

To believe or not to believe: Validating explanation fidelity for dynamic malware analysis

Authors: Li Chen, Carter Yagemann, Evan Downing | Published: 2019-04-30
Malware Detection
Deep Learning Technology
Image Classification Interpretation

Detecting Adversarial Examples through Nonlinear Dimensionality Reduction

Authors: Francesco Crecchi, Davide Bacciu, Battista Biggio | Published: 2019-04-30 | Updated: 2019-05-01
Adversarial Example
Adversarial Attack Methods
Deep Learning Technology

SEALion: a Framework for Neural Network Inference on Encrypted Data

Authors: Tim van Elsloo, Giorgio Patrini, Hamish Ivey-Law | Published: 2019-04-29
Framework
Encryption Method
Deep Learning Technology

Deep pNML: Predictive Normalized Maximum Likelihood for Deep Neural Networks

Authors: Koby Bibas, Yaniv Fogel, Meir Feder | Published: 2019-04-28 | Updated: 2020-01-08
Out-of-Distribution Detection
Robust Estimation
Deep Learning Technology

End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

Authors: Bahram Mohammadi, Mohammad Sabokrou | Published: 2019-04-25
Intrusion Detection System
Deep Learning Technology
Evaluation Method

Detecting ADS-B Spoofing Attacks using Deep Neural Networks

Authors: Xuhang Ying, Joanna Mazer, Giuseppe Bernieri, Mauro Conti, Linda Bushnell, Radha Poovendran | Published: 2019-04-22
DNN-based Message Classifier
Data Collection Method
Deep Learning Technology