A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning Authors: Xuanqing Liu, Si Si, Xiaojin Zhu, Yang Li, Cho-Jui Hsieh | Published: 2019-10-30 Convergence analysisAttack MethodContent Specialized for Toxicity Attacks 2019.10.30 2025.05.28 Literature Database
Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization Authors: Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy | Published: 2019-10-30 PoisoningAttack MethodAdversarial Example 2019.10.30 2025.05.28 Literature Database
Privacy Enhanced Multimodal Neural Representations for Emotion Recognition Authors: Mimansa Jaiswal, Emily Mower Provost | Published: 2019-10-29 Privacy ManagementAttack Methodevaluation metrics 2019.10.29 2025.05.28 Literature Database
MaskedNet: The First Hardware Inference Engine Aiming Power Side-Channel Protection Authors: Anuj Dubey, Rosario Cammarota, Aydin Aysu | Published: 2019-10-29 | Updated: 2019-12-02 Membership InferenceAttack MethodEffectiveness Analysis of Defense Methods 2019.10.29 2025.05.28 Literature Database
Active Subspace of Neural Networks: Structural Analysis and Universal Attacks Authors: Chunfeng Cui, Kaiqi Zhang, Talgat Daulbaev, Julia Gusak, Ivan Oseledets, Zheng Zhang | Published: 2019-10-29 | Updated: 2020-04-29 Risks of Model CompressionAttack MethodDimensionality Reduction Method 2019.10.29 2025.05.28 Literature Database
Detection of Adversarial Attacks and Characterization of Adversarial Subspace Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-10-26 Secure Logistic RegressionAttack MethodAdversarial Example Detection 2019.10.26 2025.05.28 Literature Database
Feedback Learning for Improving the Robustness of Neural Networks Authors: Chang Song, Zuoguan Wang, Hai Li | Published: 2019-09-12 Class ImbalanceAttack MethodAdversarial Example 2019.09.12 2025.05.28 Literature Database
Learning-Guided Network Fuzzing for Testing Cyber-Physical System Defences Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun, Sridhar Adepu, Fan Zhang | Published: 2019-09-12 Sensor State EstimationAttack MethodMachine Learning Application 2019.09.12 2025.05.28 Literature Database
Structural Robustness for Deep Learning Architectures Authors: Carlos Lassance, Vincent Gripon, Jian Tang, Antonio Ortega | Published: 2019-09-11 Attack MethodMachine Learning ApplicationMachine Learning Method 2019.09.11 2025.05.28 Literature Database
Sparse and Imperceivable Adversarial Attacks Authors: Francesco Croce, Matthias Hein | Published: 2019-09-11 PoisoningAttack MethodMachine Learning Method 2019.09.11 2025.05.28 Literature Database