Defense Method

Breaking the De-Pois Poisoning Defense

Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03
Backdoor Attack
Poisoning
Defense Method

Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning

Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-03-25
Trojan Horse Signature
Knowledge Distillation
Defense Method

Email Summarization to Assist Users in Phishing Identification

Authors: Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph | Published: 2022-03-24
Business Email Compromise
Email Security
Defense Method

MERLIN — Malware Evasion with Reinforcement LearnINg

Authors: Tony Quertier, Benjamin Marais, Stéphane Morucci, Bertrand Fournel | Published: 2022-03-24 | Updated: 2022-03-30
Privacy Protection
Reinforcement Learning Algorithm
Defense Method

RES-HD: Resilient Intelligent Fault Diagnosis Against Adversarial Attacks Using Hyper-Dimensional Computing

Authors: Onat Gungor, Tajana Rosing, Baris Aksanli | Published: 2022-03-14
Poisoning
Vulnerability Attack Method
Defense Method

One Parameter Defense — Defending against Data Inference Attacks via Differential Privacy

Authors: Dayong Ye, Sheng Shen, Tianqing Zhu, Bo Liu, Wanlei Zhou | Published: 2022-03-13
Privacy Enhancing Technology
Membership Inference
Defense Method

An integrated Auto Encoder-Block Switching defense approach to prevent adversarial attacks

Authors: Anirudh Yadav, Ashutosh Upadhyay, S. Sharanya | Published: 2022-03-11
Training Data Generation
Adversarial Example
Defense Method

Towards Efficient Data-Centric Robust Machine Learning with Noise-based Augmentation

Authors: Xiaogeng Liu, Haoyu Wang, Yechao Zhang, Fangzhou Wu, Shengshan Hu | Published: 2022-03-08
Data Generation
Robustness Evaluation
Defense Method

Adversarial Patterns: Building Robust Android Malware Classifiers

Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12
Malware Classification
Adversarial Example
Defense Method

Adversarial attacks on neural networks through canonical Riemannian foliations

Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18
Robustness
Selection and Evaluation of Optimization Algorithms
Defense Method