Mockingbird: Defending Against Deep-Learning-Based Website Fingerprinting Attacks with Adversarial Traces Authors: Mohammad Saidur Rahman, Mohsen Imani, Nate Mathews, Matthew Wright | Published: 2019-02-18 | Updated: 2020-10-28 Backdoor DetectionAdversarial ExampleAdversarial Attack Methods 2019.02.18 2025.05.28 Literature Database
STRIP: A Defence Against Trojan Attacks on Deep Neural Networks Authors: Yansong Gao, Chang Xu, Derui Wang, Shiping Chen, Damith C. Ranasinghe, Surya Nepal | Published: 2019-02-18 | Updated: 2020-01-17 Trigger DetectionTrojan DetectionBackdoor Detection 2019.02.18 2025.05.28 Literature Database
Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19 Backdoor DetectionDetection of Model Extraction AttacksVisual Privacy 2019.02.05 2025.05.28 Literature Database
Towards resilient machine learning for ransomware detection Authors: Li Chen, Chih-Yuan Yang, Anindya Paul, Ravi Sahita | Published: 2018-12-21 | Updated: 2019-05-16 Backdoor DetectionMalware Detection MethodGenerative Adversarial Network 2018.12.21 2025.05.28 Literature Database
A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks Authors: Jinghui Chen, Dongruo Zhou, Jinfeng Yi, Quanquan Gu | Published: 2018-11-27 | Updated: 2019-09-15 Backdoor DetectionModel Performance EvaluationSelection and Evaluation of Optimization Algorithms 2018.11.27 2025.05.28 Literature Database
The Taboo Trap: Behavioural Detection of Adversarial Samples Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21 Backdoor DetectionEncryption TechnologyDefense Method 2018.11.18 2025.05.28 Literature Database
Shallow-Deep Networks: Understanding and Mitigating Network Overthinking Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2018-10-16 | Updated: 2019-05-09 Backdoor DetectionRobustness Improvement MethodImpact of Generalization 2018.10.16 2025.05.28 Literature Database
Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection Authors: Omar M. K. Alhawi, James Baldwin, Ali Dehghantanha | Published: 2018-07-27 Backdoor DetectionModel EvaluationMachine Learning Application 2018.07.27 2025.05.28 Literature Database
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks Authors: Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg | Published: 2018-05-30 Backdoor DetectionAttack MethodDeep Learning 2018.05.30 2025.05.28 Literature Database
Detecting Deceptive Reviews using Generative Adversarial Networks Authors: Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna | Published: 2018-05-25 Backdoor DetectionCertified RobustnessDeception Detection 2018.05.25 2025.05.28 Literature Database