Deep Learning

DL-Droid: Deep learning based android malware detection using real devices

Authors: Mohammed K. Alzaylaee, Suleiman Y. Yerima, Sakir Sezer | Published: 2019-11-22
Model Performance Evaluation
Deep Learning
Feature Extraction Method

mm-Pose: Real-Time Human Skeletal Posture Estimation using mmWave Radars and CNNs

Authors: Arindam Sengupta, Feng Jin, Renyuan Zhang, Siyang Cao | Published: 2019-11-21
Model Performance Evaluation
Radar Technology
Deep Learning

Mapper Based Classifier

Authors: Jacek Cyranka, Alexander Georges, David Meyer | Published: 2019-10-17 | Updated: 2019-10-21
Model Robustness
Deep Learning
Generative Model

MUTE: Data-Similarity Driven Multi-hot Target Encoding for Neural Network Design

Authors: Mayoore S. Jaiswal, Bumsoo Kang, Jinho Lee, Minsik Cho | Published: 2019-10-15
Model Robustness
Deep Learning

Evolutionary Trigger Set Generation for DNN Black-Box Watermarking

Authors: Jia Guo, Miodrag Potkonjak | Published: 2019-06-11 | Updated: 2021-02-14
DNN IP Protection Method
Adversarial Learning
Deep Learning

Adversarial Attack Generation Empowered by Min-Max Optimization

Authors: Jingkang Wang, Tianyun Zhang, Sijia Liu, Pin-Yu Chen, Jiacen Xu, Makan Fardad, Bo Li | Published: 2019-06-09 | Updated: 2021-11-01
Adversarial Learning
Deep Learning
Defense Method

Identifying Classes Susceptible to Adversarial Attacks

Authors: Rangeet Pan, Md Johirul Islam, Shibbir Ahmed, Hridesh Rajan | Published: 2019-05-30
Vulnerability of Adversarial Examples
Adversarial Attack Methods
Deep Learning

Bandlimiting Neural Networks Against Adversarial Attacks

Authors: Yuping Lin, Kasra Ahmadi K. A., Hui Jiang | Published: 2019-05-30
Poisoning
Vulnerability of Adversarial Examples
Deep Learning

CopyCAT: Taking Control of Neural Policies with Constant Attacks

Authors: Léonard Hussenot, Matthieu Geist, Olivier Pietquin | Published: 2019-05-29 | Updated: 2020-01-21
Effective Perturbation Methods
Adversarial attack
Deep Learning

Expected Tight Bounds for Robust Training

Authors: Salman Alsubaihi, Adel Bibi, Modar Alfadly, Abdullah Hamdi, Bernard Ghanem | Published: 2019-05-28 | Updated: 2021-06-12
Robustness Improvement Method
Adversarial attack
Deep Learning