Algorithm

MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation

Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28
Algorithm
Attack Method
Optimization Methods

Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics

Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06
Algorithm
Role of Machine Learning
evaluation metrics

Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder

Authors: Guanlin Li, Shuya Ding, Jun Luo, Chang Liu | Published: 2020-05-06
Algorithm
Robustness Improvement Method
Adversarial Attack Detection

Depth-2 Neural Networks Under a Data-Poisoning Attack

Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29
Algorithm
Poisoning
evaluation metrics

Differentially Private Collaborative Intrusion Detection Systems For VANETs

Authors: Tao Zhang, Quanyan Zhu | Published: 2020-05-02
Algorithm
Privacy Analysis
Privacy Assessment

Robust Deep Learning as Optimal Control: Insights and Convergence Guarantees

Authors: Jacob H. Seidman, Mahyar Fazlyab, Victor M. Preciado, George J. Pappas | Published: 2020-05-01
Algorithm
Adversarial Example
Optimization Strategy

Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability

Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29
Algorithm
Adversarial Attack Detection
Role of Machine Learning

Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph

Authors: Amir Hossein Kargaran, Mohammad Sadegh Akhondzadeh, Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Kave Salamatian, Masoud Nejad Sattary | Published: 2020-04-29 | Updated: 2021-05-10
URL analysis techniques
Algorithm
Privacy Assessment

Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks

Authors: Alex Habeen Chang, Benjamin M. Case | Published: 2020-04-28 | Updated: 2020-04-29
Algorithm
Attack Pattern Extraction
Encryption Method

Printing and Scanning Attack for Image Counter Forensics

Authors: Hailey Joren, Otkrist Gupta, Dan Raviv | Published: 2020-04-27 | Updated: 2020-06-24
Algorithm
Image Feature Extraction
Vulnerability detection