Adversarial Defense Through Network Profiling Based Path Extraction Authors: Yuxian Qiu, Jingwen Leng, Cong Guo, Quan Chen, Chao Li, Minyi Guo, Yuhao Zhu | Published: 2019-04-17 | Updated: 2019-05-09 Model Performance EvaluationAdversarial Attack DetectionDeep Learning 2019.04.17 2025.05.28 Literature Database
Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction Authors: Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim | Published: 2019-04-15 Adversarial LearningAdversarial Attack DetectionDeep Learning 2019.04.15 2025.05.28 Literature Database
Machine Learning in IoT Security: Current Solutions and Future Challenges Authors: Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain | Published: 2019-03-14 Characteristics of IoT NetworksMachine Learning MethodDeep Learning 2019.03.14 2025.05.28 Literature Database
Hessian-Aware Zeroth-Order Optimization for Black-Box Adversarial Attack Authors: Haishan Ye, Zhichao Huang, Cong Fang, Chris Junchi Li, Tong Zhang | Published: 2018-12-29 | Updated: 2019-03-20 Machine learningConvergence analysisDeep Learning 2018.12.29 2025.05.28 Literature Database
Increasing the adversarial robustness and explainability of capsule networks with $γ$-capsules Authors: David Peer, Sebastian Stabinger, Antonio Rodriguez-Sanchez | Published: 2018-12-23 | Updated: 2019-12-05 Multi-Class ClassificationRobustnessDeep Learning 2018.12.23 2025.05.28 Literature Database
Deep Transfer Learning for Static Malware Classification Authors: Li Chen | Published: 2018-12-18 Malware Detection MethodDeep LearningDeep Learning Model 2018.12.18 2025.05.28 Literature Database
Adversarial Framing for Image and Video Classification Authors: Konrad Zolna, Michal Zajac, Negar Rostamzadeh, Pedro O. Pinheiro | Published: 2018-12-11 | Updated: 2019-10-17 Adversarial Example DetectionDeep Learning 2018.12.11 2025.05.28 Literature Database
Crossfire Attack Detection using Deep Learning in Software Defined ITS Networks Authors: Akash Raj Narayanadoss, Tram Truong-Huu, Purnima Murali Mohan, Mohan Gurusamy | Published: 2018-12-10 | Updated: 2019-02-14 Traffic Characteristic AnalysisAttack DetectionDeep Learning 2018.12.10 2025.05.28 Literature Database
Efficient Deep Learning on Multi-Source Private Data Authors: Nick Hynes, Raymond Cheng, Dawn Song | Published: 2018-07-17 Privacy-Preserving Machine LearningDifferential PrivacyDeep Learning 2018.07.17 2025.05.28 Literature Database
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks Authors: Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg | Published: 2018-05-30 Backdoor DetectionAttack MethodDeep Learning 2018.05.30 2025.05.28 Literature Database