Hardening Random Forest Cyber Detectors Against Adversarial Attacks Authors: Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti | Published: 2019-12-09 Data GenerationRobustnessAdversarial Example 2019.12.09 2025.05.28 Literature Database
A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks Authors: Prithviraj Dasgupta, Joseph B. Collins | Published: 2019-12-04 Data GenerationVulnerability of Adversarial ExamplesAdversarial Transferability 2019.12.04 2025.05.28 Literature Database
DeepWiFi: Cognitive WiFi with Deep Learning Authors: Kemal Davaslioglu, Sohraab Soltani, Tugba Erpek, Yalin E. Sagduyu | Published: 2019-10-29 Simulation EnvironmentData GenerationProtocol Procedure 2019.10.29 2025.05.28 Literature Database
DaiMoN: A Decentralized Artificial Intelligence Model Network Authors: Surat Teerapittayanon, H. T. Kung | Published: 2019-07-19 Data GenerationBlockchain IntegrationMachine Learning Technology 2019.07.19 2025.05.28 Literature Database
STGAN: A Unified Selective Transfer Network for Arbitrary Image Attribute Editing Authors: Ming Liu, Yukang Ding, Min Xia, Xiao Liu, Errui Ding, Wangmeng Zuo, Shilei Wen | Published: 2019-04-22 Data GenerationDeepfakeImage Processing 2019.04.22 2025.05.28 Literature Database
A Style-Based Generator Architecture for Generative Adversarial Networks Authors: Tero Karras, Samuli Laine, Timo Aila | Published: 2018-12-12 | Updated: 2019-03-29 Data GenerationDeepfakeImage Processing 2018.12.12 2025.05.28 Literature Database
Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection Authors: Jinoh Kim, Caitlin Sim, Jinhwan Choi | Published: 2018-10-03 Data GenerationAnomaly Detection in LogsResearch Methodology 2018.10.03 2025.05.28 Literature Database
Implicit Generative Modeling of Random Noise during Training for Adversarial Robustness Authors: Priyadarshini Panda, Kaushik Roy | Published: 2018-07-05 | Updated: 2019-05-31 Data GenerationCertified RobustnessAdversarial Learning 2018.07.05 2025.05.28 Literature Database
PRADA: Protecting against DNN Model Stealing Attacks Authors: Mika Juuti, Sebastian Szyller, Samuel Marchal, N. Asokan | Published: 2018-05-07 | Updated: 2019-03-31 Data GenerationModel Extraction AttackThreat Model 2018.05.07 2025.05.28 Literature Database
AttGAN: Facial Attribute Editing by Only Changing What You Want Authors: Zhenliang He, Wangmeng Zuo, Meina Kan, Shiguang Shan, Xilin Chen | Published: 2017-11-29 | Updated: 2018-07-25 Data GenerationDeepfakeImage Processing 2017.11.29 2025.05.28 Literature Database