Watermark Evaluation

Random CapsNet Forest Model for Imbalanced Malware Type Classification Task

Authors: Aykut Çayır, Uğur Ünal, Hasan Dağ | Published: 2019-12-20 | Updated: 2020-08-23
Adversarial Learning
Deep Learning
Watermark Evaluation

A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction

Authors: Syed Rahman, Haneen Aburub, Yemeserach Mekonnen, Arif I. Sarwat | Published: 2018-06-07
Cybersecurity
Climate Information
Watermark Evaluation

MEBN-RM: A Mapping between Multi-Entity Bayesian Network and Relational Model

Authors: Cheol Young Park, Kathryn Blackmond Laskey | Published: 2018-06-06 | Updated: 2018-06-08
Relational Database
Watermark Evaluation
Function Mapping

Killing four birds with one Gaussian process: the relation between different test-time attacks

Authors: Kathrin Grosse, Michael T. Smith, Michael Backes | Published: 2018-06-06 | Updated: 2020-11-29
Prompt leaking
Membership Inference
Watermark Evaluation

Set-based Obfuscation for Strong PUFs against Machine Learning Attacks

Authors: Jiliang Zhang, Chaoqun Shen | Published: 2018-06-06 | Updated: 2019-11-13
Cybersecurity
User Authentication System
Watermark Evaluation

An Explainable Adversarial Robustness Metric for Deep Learning Neural Networks

Authors: Chirag Agarwal, Bo Dong, Dan Schonfeld, Anthony Hoogs | Published: 2018-06-05 | Updated: 2018-06-06
Adversarial Example Detection
Adversarial Transferability
Watermark Evaluation

ML-Leaks: Model and Data Independent Membership Inference Attacks and Defenses on Machine Learning Models

Authors: Ahmed Salem, Yang Zhang, Mathias Humbert, Pascal Berrang, Mario Fritz, Michael Backes | Published: 2018-06-04 | Updated: 2018-12-14
Membership Inference
Model Extraction Attack
Watermark Evaluation

Detecting Adversarial Examples via Key-based Network

Authors: Pinlong Zhao, Zhouyu Fu, Ou wu, Qinghua Hu, Jun Wang | Published: 2018-06-02
Adversarial Learning
Adversarial Transferability
Watermark Evaluation

Tokenized Data Markets

Authors: Bharath Ramsundar, Roger Chen, Alok Vasudev, Rob Robbins, Artur Gorokh | Published: 2018-05-31
Data Flow Analysis
Voting Mechanism
Watermark Evaluation

Defending Against Machine Learning Model Stealing Attacks Using Deceptive Perturbations

Authors: Taesung Lee, Benjamin Edwards, Ian Molloy, Dong Su | Published: 2018-05-31 | Updated: 2018-12-13
Certified Robustness
Detection of Model Extraction Attacks
Watermark Evaluation