Poisoning Attacks with Generative Adversarial Nets Authors: Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu | Published: 2019-06-18 | Updated: 2019-09-25 Backdoor AttackAttack MethodGenerative Adversarial Network 2019.06.18 2025.05.28 Literature Database
On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum | Published: 2019-06-18 | Updated: 2019-11-26 DNN IP Protection MethodBackdoor AttackAttack Method 2019.06.18 2025.05.28 Literature Database
Membership Privacy for Machine Learning Models Through Knowledge Transfer Authors: Virat Shejwalkar, Amir Houmansadr | Published: 2019-06-15 | Updated: 2020-12-31 Privacy ProtectionAttack MethodKnowledge Transferability 2019.06.15 2025.05.28 Literature Database
Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal | Published: 2018-12-07 Attack MethodAdversarial Example DetectionDefense Effectiveness Analysis 2018.12.07 2025.05.28 Literature Database
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks Authors: Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg | Published: 2018-05-30 Backdoor DetectionAttack MethodDeep Learning 2018.05.30 2025.05.28 Literature Database
What we learn from learning – Understanding capabilities and limitations of machine learning in botnet attacks Authors: David Santana, Shan Suthaharan, Somya Mohanty | Published: 2018-05-03 CybersecurityBotnet TrafficAttack Method 2018.05.03 2025.05.28 Literature Database
MEADE: Towards a Malicious Email Attachment Detection Engine Authors: Ethan M. Rudd, Richard Harang, Joshua Saxe | Published: 2018-04-22 CybersecurityAttack MethodAdversarial Example Detection 2018.04.22 2025.05.28 Literature Database
Neural Trojans Authors: Yuntao Liu, Yang Xie, Ankur Srivastava | Published: 2017-10-03 Backdoor DetectionAttack MethodDeep Learning 2017.10.03 2025.05.28 Literature Database
On Security and Sparsity of Linear Classifiers for Adversarial Settings Authors: Ambra Demontis, Paolo Russu, Battista Biggio, Giorgio Fumera, Fabio Roli | Published: 2017-08-31 Membership InferenceRobustness AnalysisAttack Method 2017.08.31 2025.05.28 Literature Database
Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16 Privacy Protection MethodAttack MethodMathematical Analysis 2017.08.30 2025.05.28 Literature Database