A Robust Comparison of the KDDCup99 and NSL-KDD IoT Network Intrusion Detection Datasets Through Various Machine Learning Algorithms Authors: Suchet Sapre, Pouyan Ahmadi, Khondkar Islam | Published: 2019-12-31 Model Selection MethodTaxonomy of AttacksAutomated Intrusion Detection System 2019.12.31 2025.05.13 Literature Database
Privacy Attacks on Network Embeddings Authors: Michael Ellers, Michael Cochez, Tobias Schumacher, Markus Strohmaier, Florian Lemmerich | Published: 2019-12-23 Privacy Protection MethodMembership InferenceTaxonomy of Attacks 2019.12.23 2025.05.13 Literature Database
Explainability and Adversarial Robustness for RNNs Authors: Alexander Hartl, Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2019-12-20 | Updated: 2020-02-19 Taxonomy of AttacksAdversarial LearningEffectiveness Analysis of Defense Methods 2019.12.20 2025.05.13 Literature Database
ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors Authors: Ivan Homoliak, Petr Hanacek | Published: 2019-10-23 Modification of Network TrafficTaxonomy of AttacksVulnerability Attack Method 2019.10.23 2025.05.13 Literature Database
Lower Bounds on Adversarial Robustness from Optimal Transport Authors: Arjun Nitin Bhagoji, Daniel Cullina, Prateek Mittal | Published: 2019-09-26 | Updated: 2019-10-30 Taxonomy of AttacksAdversarial attackMachine Learning Application 2019.09.26 2025.05.13 Literature Database
GAMIN: An Adversarial Approach to Black-Box Model Inversion Authors: Ulrich Aïvodji, Sébastien Gambs, Timon Ther | Published: 2019-09-26 PoisoningTaxonomy of AttacksGenerative Adversarial Network 2019.09.26 2025.05.13 Literature Database
Sign-OPT: A Query-Efficient Hard-label Adversarial Attack Authors: Minhao Cheng, Simranjit Singh, Patrick Chen, Pin-Yu Chen, Sijia Liu, Cho-Jui Hsieh | Published: 2019-09-24 | Updated: 2020-02-14 Convergence AnalysisTaxonomy of AttacksAdversarial attack 2019.09.24 2025.05.13 Literature Database
Defending Against Physically Realizable Attacks on Image Classification Authors: Tong Wu, Liang Tong, Yevgeniy Vorobeychik | Published: 2019-09-20 | Updated: 2020-02-14 PoisoningTaxonomy of AttacksAdversarial attack 2019.09.20 2025.05.13 Literature Database
Adversarial Vulnerability Bounds for Gaussian Process Classification Authors: Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A Alvarez | Published: 2019-09-19 Taxonomy of AttacksAdversarial ExampleMachine Learning Technology 2019.09.19 2025.05.13 Literature Database
Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30 Taxonomy of AttacksAdversarial ExampleAdversarial Learning 2019.07.30 2025.05.13 Literature Database