PDA: Progressive Data Augmentation for General Robustness of Deep Neural Networks Authors: Hang Yu, Aishan Liu, Xianglong Liu, Gengchao Li, Ping Luo, Ran Cheng, Jichen Yang, Chongzhi Zhang | Published: 2019-09-11 | Updated: 2020-02-24 PoisoningModel RobustnessAttack Method 2019.09.11 2025.05.28 Literature Database
Effectiveness of Adversarial Examples and Defenses for Malware Classification Authors: Robert Podschwadt, Hassan Takabi | Published: 2019-09-10 Attack MethodAdversarial ExampleAdaptive Adversarial Training 2019.09.10 2025.05.28 Literature Database
Poisoning Attacks with Generative Adversarial Nets Authors: Luis Muñoz-González, Bjarne Pfitzner, Matteo Russo, Javier Carnerero-Cano, Emil C. Lupu | Published: 2019-06-18 | Updated: 2019-09-25 Backdoor AttackAttack MethodGenerative Adversarial Network 2019.06.18 2025.05.28 Literature Database
On the Robustness of the Backdoor-based Watermarking in Deep Neural Networks Authors: Masoumeh Shafieinejad, Jiaqi Wang, Nils Lukas, Xinda Li, Florian Kerschbaum | Published: 2019-06-18 | Updated: 2019-11-26 DNN IP Protection MethodBackdoor AttackAttack Method 2019.06.18 2025.05.28 Literature Database
Membership Privacy for Machine Learning Models Through Knowledge Transfer Authors: Virat Shejwalkar, Amir Houmansadr | Published: 2019-06-15 | Updated: 2020-12-31 Privacy ProtectionAttack MethodKnowledge Transferability 2019.06.15 2025.05.28 Literature Database
Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal | Published: 2018-12-07 Attack MethodAdversarial Example DetectionDefense Effectiveness Analysis 2018.12.07 2025.05.28 Literature Database
Fine-Pruning: Defending Against Backdooring Attacks on Deep Neural Networks Authors: Kang Liu, Brendan Dolan-Gavitt, Siddharth Garg | Published: 2018-05-30 Backdoor DetectionAttack MethodDeep Learning 2018.05.30 2025.05.28 Literature Database
What we learn from learning – Understanding capabilities and limitations of machine learning in botnet attacks Authors: David Santana, Shan Suthaharan, Somya Mohanty | Published: 2018-05-03 CybersecurityBotnet TrafficAttack Method 2018.05.03 2025.05.28 Literature Database
MEADE: Towards a Malicious Email Attachment Detection Engine Authors: Ethan M. Rudd, Richard Harang, Joshua Saxe | Published: 2018-04-22 CybersecurityAttack MethodAdversarial Example Detection 2018.04.22 2025.05.28 Literature Database
Neural Trojans Authors: Yuntao Liu, Yang Xie, Ankur Srivastava | Published: 2017-10-03 Backdoor DetectionAttack MethodDeep Learning 2017.10.03 2025.05.28 Literature Database