Performance Evaluation

Generating Black-Box Adversarial Examples in Sparse Domain

Authors: Hadi Zanddizari, Behnam Zeinali, J. Morris Chang | Published: 2021-01-22 | Updated: 2021-10-15
Performance Evaluation
Adversarial Example
Adversarial attack

Membership Inference Attack on Graph Neural Networks

Authors: Iyiola E. Olatunji, Wolfgang Nejdl, Megha Khosla | Published: 2021-01-17 | Updated: 2021-12-18
Membership Inference
Performance Evaluation
Defense Effectiveness Analysis

Double-Adversarial Activation Anomaly Detection: Adversarial Autoencoders are Anomaly Generators

Authors: J. -P. Schulze, P. Sperl, K. Böttinger | Published: 2021-01-12 | Updated: 2024-01-14
Performance Evaluation
Machine Learning Method
Generative Adversarial Network

Active Learning Under Malicious Mislabeling and Poisoning Attacks

Authors: Jing Lin, Ryan Luley, Kaiqi Xiong | Published: 2021-01-01 | Updated: 2021-09-02
Backdoor Attack
Poisoning
Performance Evaluation

An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies

Authors: Rony Chowdhury Ripan, Iqbal H. Sarker, Md Musfique Anwar, Md. Hasan Furhad, Fazle Rahat, Mohammed Moshiul Hoque, Muhammad Sarfraz | Published: 2020-12-09
Performance Evaluation
Machine Learning Method
Feature Extraction Method

Improving Query Efficiency of Black-box Adversarial Attack

Authors: Yang Bai, Yuyuan Zeng, Yong Jiang, Yisen Wang, Shu-Tao Xia, Weiwei Guo | Published: 2020-09-24 | Updated: 2020-09-25
Performance Evaluation
Selection and Evaluation of Optimization Algorithms
Generative Model

Phishing Detection Using Machine Learning Techniques

Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi | Published: 2020-09-20
Performance Evaluation
Malicious Website Detection
Information Security

Manifold attack

Authors: Khanh-Hung Tran, Fred-Maurice Ngole-Mboula, Jean-Luc Starck | Published: 2020-09-13 | Updated: 2021-03-17
Membership Inference
Performance Evaluation
Adversarial Attack Methods

Federated Model Distillation with Noise-Free Differential Privacy

Authors: Lichao Sun, Lingjuan Lyu | Published: 2020-09-11 | Updated: 2021-05-21
Performance Evaluation
Machine Learning Technology
Evaluation Method

Second Order Optimization for Adversarial Robustness and Interpretability

Authors: Theodoros Tsiligkaridis, Jay Roberts | Published: 2020-09-10
Performance Evaluation
Adversarial Attack Methods
Deep Learning Technology