Data Generation

EVAGAN: Evasion Generative Adversarial Network for Low Data Regimes

Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Husnain Rafiq | Published: 2021-09-14 | Updated: 2022-08-06
Data Generation
Performance Evaluation
Adversarial attack

Deep Generative Models to Extend Active Directory Graphs with Honeypot Users

Authors: Ondrej Lukas, Sebastian Garcia | Published: 2021-09-13
Graph Neural Network
Data Extraction and Analysis
Data Generation

Statistical Privacy Guarantees of Machine Learning Preprocessing Techniques

Authors: Ashly Lau, Jonathan Passerat-Palmbach | Published: 2021-09-06
Data Generation
Privacy Assessment
Statistical Hypothesis Testing

Mitigating Statistical Bias within Differentially Private Synthetic Data

Authors: Sahra Ghalebikesabi, Harrison Wilde, Jack Jewson, Arnaud Doucet, Sebastian Vollmer, Chris Holmes | Published: 2021-08-24 | Updated: 2022-05-19
Data Generation
Privacy Assessment
Machine Learning Method

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

Authors: Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera | Published: 2021-07-30
Data Generation
Poisoning
Machine Learning Algorithm

Auxiliary-Classifier GAN for Malware Analysis

Authors: Rakesh Nagaraju, Mark Stamp | Published: 2021-07-04
Data Generation
Malware Evolution
Deep Learning Method

Learner-Private Convex Optimization

Authors: Jiaming Xu, Kuang Xu, Dana Yang | Published: 2021-02-23 | Updated: 2021-10-23
Data Collection
Data Generation
Bayesian Classification

Certifiably Robust Variational Autoencoders

Authors: Ben Barrett, Alexander Camuto, Matthew Willetts, Tom Rainforth | Published: 2021-02-15 | Updated: 2022-04-23
Watermarking
Data Generation
Model Architecture

Symmetric Sparse Boolean Matrix Factorization and Applications

Authors: Sitan Chen, Zhao Song, Runzhou Tao, Ruizhe Zhang | Published: 2021-02-02 | Updated: 2022-01-13
Watermarking
Data Generation
Linear Independence

Differentially Private Adversarial Robustness Through Randomized Perturbations

Authors: Nan Xu, Oluwaseyi Feyisetan, Abhinav Aggarwal, Zekun Xu, Nathanael Teissier | Published: 2020-09-27
Data Generation
Relationship between Robustness and Privacy
Adversarial Example