Breaking the De-Pois Poisoning Defense Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03 Backdoor AttackPoisoningDefense Method 2022.04.03 2025.05.28 Literature Database
Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-03-25 Trojan Horse SignatureKnowledge DistillationDefense Method 2022.03.25 2025.05.28 Literature Database
Email Summarization to Assist Users in Phishing Identification Authors: Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph | Published: 2022-03-24 Business Email CompromiseEmail SecurityDefense Method 2022.03.24 2025.05.28 Literature Database
MERLIN — Malware Evasion with Reinforcement LearnINg Authors: Tony Quertier, Benjamin Marais, Stéphane Morucci, Bertrand Fournel | Published: 2022-03-24 | Updated: 2022-03-30 Privacy ProtectionReinforcement Learning AlgorithmDefense Method 2022.03.24 2025.05.28 Literature Database
RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2022-03-14 PoisoningVulnerability Attack MethodDefense Method 2022.03.14 2025.05.28 Literature Database
One Parameter Defense — Defending against Data Inference Attacks via Differential Privacy Authors: Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou | Published: 2022-03-13 Privacy Enhancing TechnologyMembership InferenceDefense Method 2022.03.13 2025.05.28 Literature Database
An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks Authors: Anirudh Yadav, Ashutosh Upadhyay, S. Sharanya | Published: 2022-03-11 Training Data GenerationAdversarial ExampleDefense Method 2022.03.11 2025.05.28 Literature Database
Towards Efficient Data-Centric Robust Machine Learning with Noise-based Augmentation Authors: Xiaogeng Liu, Haoyu Wang, Yechao Zhang, Fangzhou Wu, Shengshan Hu | Published: 2022-03-08 Data GenerationRobustness EvaluationDefense Method 2022.03.08 2025.05.28 Literature Database
Adversarial Patterns: Building Robust Android Malware Classifiers Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12 Malware ClassificationAdversarial ExampleDefense Method 2022.03.04 2025.05.28 Literature Database
Adversarial attacks on neural networks through canonical Riemannian foliations Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18 RobustnessSelection and Evaluation of Optimization AlgorithmsDefense Method 2022.03.02 2025.05.28 Literature Database