Deep k-NN Defense against Clean-label Data Poisoning Attacks Authors: Neehar Peri, Neal Gupta, W. Ronny Huang, Liam Fowl, Chen Zhu, Soheil Feizi, Tom Goldstein, John P. Dickerson | Published: 2019-09-29 | Updated: 2020-08-13 Backdoor AttackPerformance EvaluationDetection of Poisonous Data 2019.09.29 2025.05.28 Literature Database
White-Box Adversarial Defense via Self-Supervised Data Estimation Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13 Security AnalysisPerformance EvaluationAdversarial Learning 2019.09.13 2025.05.28 Literature Database
Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13 Performance EvaluationAdversarial ExampleAdversarial Learning 2019.09.13 2025.05.28 Literature Database
nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data Authors: Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski | Published: 2019-08-12 | Updated: 2019-08-29 CKKS OptimizationPerformance EvaluationEncryption Technology 2019.08.12 2025.05.28 Literature Database
A systematic review of fuzzing based on machine learning techniques Authors: Yan Wang, Peng Jia, Luping Liu, Jiayong Liu | Published: 2019-08-04 Data Generation MethodPerformance EvaluationMachine Learning 2019.08.04 2025.05.28 Literature Database
Boosting Privately: Privacy-Preserving Federated Extreme Boosting for Mobile Crowdsensing Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Siqi Ma, Surya Nepal, Robert Deng | Published: 2019-07-24 | Updated: 2020-04-10 Security AssurancePrivacy ProtectionPerformance Evaluation 2019.07.24 2025.05.28 Literature Database
ME-Net: Towards Effective Adversarial Robustness with Matrix Estimation Authors: Yuzhe Yang, Guo Zhang, Dina Katabi, Zhi Xu | Published: 2019-05-28 Model EvaluationPerformance EvaluationAdversarial Perturbation Techniques 2019.05.28 2025.05.28 Literature Database
Robustification of deep net classifiers by key based diversified aggregation with pre-filtering Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-14 Secure AggregationPerformance EvaluationAttack Type 2019.05.14 2025.05.28 Literature Database
Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren | Published: 2019-05-12 Performance EvaluationMachine Learning TechnologyMulti-Sensor Defense 2019.05.12 2025.05.28 Literature Database
ECG Identification under Exercise and Rest Situations via Various Learning Methods Authors: Zihan Wang, Yaoguang Li, Wei Cui | Published: 2019-05-11 Signal Processing TechniquesPerformance EvaluationTime Series Analysis 2019.05.11 2025.05.28 Literature Database