Robustifying automatic speech recognition by extracting slowly varying features Authors: Matías Pizarro, Dorothea Kolossa, Asja Fischer | Published: 2021-12-14 | Updated: 2024-11-06 PoisoningAdversarial TrainingDefense Method 2021.12.14 2025.05.28 Literature Database
On the Security & Privacy in Federated Learning Authors: Gorka Abad, Stjepan Picek, Víctor Julio Ramírez-Durán, Aitor Urbieta | Published: 2021-12-10 | Updated: 2022-03-16 Backdoor AttackPoisoningDefense Method 2021.12.10 2025.05.28 Literature Database
Statically Detecting Adversarial Malware through Randomised Chaining Authors: Matthew Crawford, Wei Wang, Ruoxi Sun, Minhui Xue | Published: 2021-11-28 | Updated: 2021-12-04 Malware Detection MethodAdversarial attackDefense Method 2021.11.28 2025.05.28 Literature Database
Deep Learning for Android Malware Defenses: a Systematic Literature Review Authors: Yue Liu, Chakkrit Tantithamthavorn, Li Li, Yepang Liu | Published: 2021-03-09 | Updated: 2022-08-09 Malware DetectionDeep Learning MethodDefense Method 2021.03.09 2025.05.28 Literature Database
Gradient-Free Adversarial Attacks for Bayesian Neural Networks Authors: Matthew Yuan, Matthew Wicker, Luca Laurenti | Published: 2020-12-23 Attack EvaluationAdversarial ExampleDefense Method 2020.12.23 2025.05.28 Literature Database
Optimized Random Forest Model for Botnet Detection Based on DNS Queries Authors: Abdallah Moubayed, MohammadNoor Injadat, Abdallah Shami | Published: 2020-12-16 DDoS AttackMachine Learning ApplicationDefense Method 2020.12.16 2025.05.28 Literature Database
Backdoor Attacks to Graph Neural Networks Authors: Zaixi Zhang, Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-06-19 | Updated: 2021-12-17 Backdoor DetectionBackdoor AttackDefense Method 2020.06.19 2025.05.28 Literature Database
EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks Authors: Sanchari Sen, Balaraman Ravindran, Anand Raghunathan | Published: 2020-04-21 Machine LearningDeep Learning-Based IDSDefense Method 2020.04.21 2025.05.28 Literature Database
Protecting Classifiers From Attacks. A Bayesian Approach Authors: Victor Gallego, Roi Naveiro, Alberto Redondo, David Rios Insua, Fabrizio Ruggeri | Published: 2020-04-18 Multi-Class ClassificationAdversarial Perturbation TechniquesDefense Method 2020.04.18 2025.05.28 Literature Database
Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15 Prompt InjectionAttack TypeDefense Method 2020.04.15 2025.05.28 Literature Database