Backdoors in Neural Models of Source Code Authors: Goutham Ramakrishnan, Aws Albarghouthi | Published: 2020-06-11 Backdoor AttackProgram AnalysisPoisoning 2020.06.11 2025.05.28 Literature Database
Sponge Examples: Energy-Latency Attacks on Neural Networks Authors: Ilia Shumailov, Yiren Zhao, Daniel Bates, Nicolas Papernot, Robert Mullins, Ross Anderson | Published: 2020-06-05 | Updated: 2021-05-12 Energy ManagementPoisoningMembership Inference 2020.06.05 2025.05.28 Literature Database
Perturbation Analysis of Gradient-based Adversarial Attacks Authors: Utku Ozbulak, Manvel Gasparyan, Wesley De Neve, Arnout Van Messem | Published: 2020-06-02 PoisoningAttack TypeAdversarial Attack Detection 2020.06.02 2025.05.28 Literature Database
Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense Authors: Jay N. Paranjape, Rahul Kumar Dubey, Vijendran V Gopalan | Published: 2020-06-02 PoisoningAttack TypeDefense Effectiveness Analysis 2020.06.02 2025.05.28 Literature Database
Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods Authors: Kyungmi Lee, Anantha P. Chandrakasan | Published: 2020-06-01 PoisoningAdversarial Attack DetectionDefense Effectiveness Analysis 2020.06.01 2025.05.28 Literature Database
A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17 Performance EvaluationPoisoningMachine Learning Technology 2020.05.26 2025.05.28 Literature Database
Keyed Non-Parametric Hypothesis Tests Authors: Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache | Published: 2020-05-25 PoisoningAdversarial attackMachine Learning Technology 2020.05.25 2025.05.28 Literature Database
Adversarial Feature Selection against Evasion Attacks Authors: Fei Zhang, Patrick P. K. Chan, Battista Biggio, Daniel S. Yeung, Fabio Roli | Published: 2020-05-25 PoisoningAdversarial attackFeature Extraction Method 2020.05.25 2025.05.28 Literature Database
Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification Authors: Sina Däubener, Lea Schönherr, Asja Fischer, Dorothea Kolossa | Published: 2020-05-24 | Updated: 2020-08-02 PoisoningQuantification of UncertaintyAdversarial Example Detection 2020.05.24 2025.05.28 Literature Database
Adversarial Attack on Hierarchical Graph Pooling Neural Networks Authors: Haoteng Tang, Guixiang Ma, Yurong Chen, Lei Guo, Wei Wang, Bo Zeng, Liang Zhan | Published: 2020-05-23 PoisoningAdversarial ExampleAdversarial attack 2020.05.23 2025.05.28 Literature Database