Black-box Detection of Backdoor Attacks with Limited Information and Data Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24 Backdoor AttackOptimization MethodsDefense Mechanism 2021.03.24 2025.05.28 Literature Database
A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24 Optimization MethodsVulnerability Assessment MethodDefense Mechanism 2021.03.24 2025.05.28 Literature Database
With False Friends Like These, Who Can Notice Mistakes? Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen | Published: 2020-12-29 | Updated: 2021-12-13 Adversarial ExampleAdversarial LearningDefense Mechanism 2020.12.29 2025.05.28 Literature Database
Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection Authors: Mir Hassan, Chen Jincai, Adnan Iftekhar, Adnan Shehzad, Xiaohui Cui | Published: 2020-12-28 Data Management SystemInformation Leakage AnalysisDefense Mechanism 2020.12.28 2025.05.28 Literature Database
Composite Adversarial Attacks Authors: Xiaofeng Mao, Yuefeng Chen, Shuhui Wang, Hang Su, Yuan He, Hui Xue | Published: 2020-12-10 Taxonomy of AttacksAdversarial Attack MethodsDefense Mechanism 2020.12.10 2025.05.28 Literature Database
Dynamic Defense Against Byzantine Poisoning Attacks in Federated Learning Authors: Nuria Rodríguez-Barroso, Eugenio Martínez-Cámara, M. Victoria Luzón, Francisco Herrera | Published: 2020-07-29 | Updated: 2022-02-24 Byzantine ResiliencePoisoningDefense Mechanism 2020.07.29 2025.05.28 Literature Database
Adversarial Robustness for Machine Learning Cyber Defenses Using Log Data Authors: Kai Steverson, Jonathan Mullin, Metin Ahiskali | Published: 2020-07-29 Attack MethodGenerative Model CharacteristicsDefense Mechanism 2020.07.29 2025.05.28 Literature Database
Robust Machine Learning via Privacy/Rate-Distortion Theory Authors: Ye Wang, Shuchin Aeron, Adnan Siraj Rakin, Toshiaki Koike-Akino, Pierre Moulin | Published: 2020-07-22 | Updated: 2021-05-18 Privacy AssessmentOptimization ProblemDefense Mechanism 2020.07.22 2025.05.28 Literature Database
On Adversarial Robustness: A Neural Architecture Search perspective Authors: Chaitanya Devaguptapu, Devansh Agarwal, Gaurav Mittal, Pulkit Gopalani, Vineeth N Balasubramanian | Published: 2020-07-16 | Updated: 2021-08-26 Performance EvaluationDeep LearningDefense Mechanism 2020.07.16 2025.05.28 Literature Database
Robustifying Reinforcement Learning Agents via Action Space Adversarial Training Authors: Kai Liang Tan, Yasaman Esfandiari, Xian Yeow Lee, Aakanksha, Soumik Sarkar | Published: 2020-07-14 Performance EvaluationAttack MethodDefense Mechanism 2020.07.14 2025.05.28 Literature Database