Generating Black-Box Adversarial Examples in Sparse Domain Authors: Hadi Zanddizari, Behnam Zeinali, J. Morris Chang | Published: 2021-01-22 | Updated: 2021-10-15 Performance EvaluationAdversarial ExampleAdversarial attack 2021.01.22 2025.05.28 Literature Database
Membership Inference Attack on Graph Neural Networks Authors: Iyiola E. Olatunji, Wolfgang Nejdl, Megha Khosla | Published: 2021-01-17 | Updated: 2021-12-18 Membership InferencePerformance EvaluationDefense Effectiveness Analysis 2021.01.17 2025.05.28 Literature Database
Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators Authors: J. -P. Schulze, P. Sperl, K. Böttinger | Published: 2021-01-12 | Updated: 2024-01-14 Performance EvaluationMachine Learning MethodGenerative Adversarial Network 2021.01.12 2025.05.28 Literature Database
Active Learning Under Malicious Mislabeling and Poisoning Attacks Authors: Jing Lin, Ryan Luley, Kaiqi Xiong | Published: 2021-01-01 | Updated: 2021-09-02 Backdoor AttackPoisoningPerformance Evaluation 2021.01.01 2025.05.28 Literature Database
An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies Authors: Rony Chowdhury Ripan, Iqbal H. Sarker, Md Musfique Anwar, Md. Hasan Furhad, Fazle Rahat, Mohammed Moshiul Hoque, Muhammad Sarfraz | Published: 2020-12-09 Performance EvaluationMachine Learning MethodFeature Extraction Method 2020.12.09 2025.05.28 Literature Database
Improving Query Efficiency of Black-box Adversarial Attack Authors: Yang Bai, Yuyuan Zeng, Yong Jiang, Yisen Wang, Shu-Tao Xia, Weiwei Guo | Published: 2020-09-24 | Updated: 2020-09-25 Performance EvaluationSelection and Evaluation of Optimization AlgorithmsGenerative Model 2020.09.24 2025.05.28 Literature Database
Phishing Detection Using Machine Learning Techniques Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi | Published: 2020-09-20 Performance EvaluationMalicious Website DetectionInformation Security 2020.09.20 2025.05.28 Literature Database
Manifold attack Authors: Khanh-Hung Tran, Fred-Maurice Ngole-Mboula, Jean-Luc Starck | Published: 2020-09-13 | Updated: 2021-03-17 Membership InferencePerformance EvaluationAdversarial Attack Methods 2020.09.13 2025.05.28 Literature Database
Federated Model Distillation with Noise-Free Differential Privacy Authors: Lichao Sun, Lingjuan Lyu | Published: 2020-09-11 | Updated: 2021-05-21 Performance EvaluationMachine Learning TechnologyEvaluation Method 2020.09.11 2025.05.28 Literature Database
Second Order Optimization for Adversarial Robustness and Interpretability Authors: Theodoros Tsiligkaridis, Jay Roberts | Published: 2020-09-10 Performance EvaluationAdversarial Attack MethodsDeep Learning Technology 2020.09.10 2025.05.28 Literature Database