Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23 Model DesignAdversarial Attack MethodsResearch Methodology 2019.11.23 2025.05.28 Literature Database
Universal adversarial examples in speech command classification Authors: Jon Vadillo, Roberto Santana | Published: 2019-11-22 | Updated: 2021-02-13 Adversarial ExampleAdversarial Attack MethodsResearch Methodology 2019.11.22 2025.05.28 Literature Database
Attack Agnostic Statistical Method for Adversarial Detection Authors: Sambuddha Saha, Aashish Kumar, Pratyush Sahay, George Jose, Srinivas Kruthiventi, Harikrishna Muralidhara | Published: 2019-11-22 Adversarial ExampleAdversarial attackResearch Methodology 2019.11.22 2025.05.28 Literature Database
Optimal Explanations of Linear Models Authors: Dimitris Bertsimas, Arthur Delarue, Patrick Jaillet, Sebastien Martin | Published: 2019-07-08 Model SelectionResearch Methodologyloss of Interpretability 2019.07.08 2025.05.28 Literature Database
Capacity Bounded Differential Privacy Authors: Kamalika Chaudhuri, Jacob Imola, Ashwin Machanavajjhala | Published: 2019-07-03 Privacy ProtectionInformation Gathering MethodsResearch Methodology 2019.07.03 2025.05.28 Literature Database
Methodology for the Automated Metadata-Based Classification of Incriminating Digital Forensic Artefacts Authors: Xiaoyu Du, Mark Scanlon | Published: 2019-07-02 Data Extraction and AnalysisMachine Learning FrameworkResearch Methodology 2019.07.02 2025.05.28 Literature Database
Machine Learning for Intelligent Authentication in 5G-and-Beyond Wireless Networks Authors: He Fang, Xianbin Wang, Stefano Tomasin | Published: 2019-06-30 | Updated: 2019-07-28 Security TestingMachine Learning FrameworkResearch Methodology 2019.06.30 2025.05.28 Literature Database
advertorch v0.1: An Adversarial Robustness Toolbox based on PyTorch Authors: Gavin Weiguang Ding, Luyu Wang, Xiaomeng Jin | Published: 2019-02-20 PoisoningAdversarial LearningResearch Methodology 2019.02.20 2025.05.28 Literature Database
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks Authors: Amir Moradibaad, Ramin Jalilian Mashhoud | Published: 2018-12-07 | Updated: 2018-12-13 Malware DetectionResearch MethodologySelection Method 2018.12.07 2025.05.28 Literature Database
Malicious Web Domain Identification using Online Credibility and Performance Data by Considering the Class Imbalance Issue Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Yukun Bao, Yuqing Lin | Published: 2018-10-19 Malware DetectionPerformance Evaluation MetricsResearch Methodology 2018.10.19 2025.05.28 Literature Database