MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28 AlgorithmAttack MethodOptimization Methods 2020.05.06 2025.05.28 Literature Database
Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06 AlgorithmRole of Machine Learningevaluation metrics 2020.05.06 2025.05.28 Literature Database
Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder Authors: Guanlin Li, Shuya Ding, Jun Luo, Chang Liu | Published: 2020-05-06 AlgorithmRobustness Improvement MethodAdversarial Attack Detection 2020.05.06 2025.05.28 Literature Database
Depth-2 Neural Networks Under a Data-Poisoning Attack Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29 AlgorithmPoisoningevaluation metrics 2020.05.04 2025.05.28 Literature Database
Differentially Private Collaborative Intrusion Detection Systems For VANETs Authors: Tao Zhang, Quanyan Zhu | Published: 2020-05-02 AlgorithmPrivacy AnalysisPrivacy Assessment 2020.05.02 2025.05.28 Literature Database
Robust Deep Learning as Optimal Control: Insights and Convergence Guarantees Authors: Jacob H. Seidman, Mahyar Fazlyab, Victor M. Preciado, George J. Pappas | Published: 2020-05-01 AlgorithmAdversarial ExampleOptimization Strategy 2020.05.01 2025.05.28 Literature Database
Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29 AlgorithmAdversarial Attack DetectionRole of Machine Learning 2020.04.29 2025.05.28 Literature Database
Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph Authors: Amir Hossein Kargaran, Mohammad Sadegh Akhondzadeh, Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Kave Salamatian, Masoud Nejad Sattary | Published: 2020-04-29 | Updated: 2021-05-10 URL analysis techniquesAlgorithmPrivacy Assessment 2020.04.29 2025.05.28 Literature Database
Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks Authors: Alex Habeen Chang, Benjamin M. Case | Published: 2020-04-28 | Updated: 2020-04-29 AlgorithmAttack Pattern ExtractionEncryption Method 2020.04.28 2025.05.28 Literature Database
Printing and Scanning Attack for Image Counter Forensics Authors: Hailey Joren, Otkrist Gupta, Dan Raviv | Published: 2020-04-27 | Updated: 2020-06-24 AlgorithmImage Feature ExtractionVulnerability detection 2020.04.27 2025.05.28 Literature Database