Research Methodology

Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference

Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23
Model Design
Adversarial Attack Methods
Research Methodology

Universal adversarial examples in speech command classification

Authors: Jon Vadillo, Roberto Santana | Published: 2019-11-22 | Updated: 2021-02-13
Adversarial Example
Adversarial Attack Methods
Research Methodology

Attack Agnostic Statistical Method for Adversarial Detection

Authors: Sambuddha Saha, Aashish Kumar, Pratyush Sahay, George Jose, Srinivas Kruthiventi, Harikrishna Muralidhara | Published: 2019-11-22
Adversarial Example
Adversarial attack
Research Methodology

Optimal Explanations of Linear Models

Authors: Dimitris Bertsimas, Arthur Delarue, Patrick Jaillet, Sebastien Martin | Published: 2019-07-08
Model Selection
Research Methodology
loss of Interpretability

Capacity Bounded Differential Privacy

Authors: Kamalika Chaudhuri, Jacob Imola, Ashwin Machanavajjhala | Published: 2019-07-03
Privacy Protection
Information Gathering Methods
Research Methodology

Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts

Authors: Xiaoyu Du, Mark Scanlon | Published: 2019-07-02
Data Extraction and Analysis
Machine Learning Framework
Research Methodology

Machine Learning for Intelligent Authentication in 5G-and-Beyond Wireless Networks

Authors: He Fang, Xianbin Wang, Stefano Tomasin | Published: 2019-06-30 | Updated: 2019-07-28
Security Testing
Machine Learning Framework
Research Methodology

advertorch v0.1: An Adversarial Robustness Toolbox based on PyTorch

Authors: Gavin Weiguang Ding, Luyu Wang, Xiaomeng Jin | Published: 2019-02-20
Poisoning
Adversarial Learning
Research Methodology

Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks

Authors: Amir Moradibaad, Ramin Jalilian Mashhoud | Published: 2018-12-07 | Updated: 2018-12-13
Malware Detection
Research Methodology
Selection Method

Malicious Web Domain Identification using Online Credibility and Performance Data by Considering the Class Imbalance Issue

Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Yukun Bao, Yuqing Lin | Published: 2018-10-19
Malware Detection
Performance Evaluation Metrics
Research Methodology