Customized Watermarking for Deep Neural Networks via Label Distribution Perturbation Authors: Tzu-Yun Chien, Chih-Ya Shen | Published: 2022-08-10 Customization MethodAdversarial ExampleWatermark Robustness 2022.08.10 2025.05.28 Literature Database
Design of secure and robust cognitive system for malware detection Authors: Sanket Shukla | Published: 2022-08-03 Malware DetectionRobustnessAdversarial Example 2022.08.03 2025.05.28 Literature Database
DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning Authors: Mohammad Hossein Samavatian, Saikat Majumdar, Kristin Barber, Radu Teodorescu | Published: 2022-07-31 DNN IP Protection MethodAttack DetectionAdversarial Example 2022.07.31 2025.05.28 Literature Database
Fine-grained Private Knowledge Distillation Authors: Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang | Published: 2022-07-27 | Updated: 2023-04-06 Privacy TechniqueAdversarial ExampleMachine Learning 2022.07.27 2025.05.28 Literature Database
Careful What You Wish For: on the Extraction of Adversarially Trained Models Authors: Kacem Khaled, Gabriela Nicolescu, Felipe Gohring de Magalhães | Published: 2022-07-21 PoisoningAttack MethodAdversarial Example 2022.07.21 2025.05.28 Literature Database
One-vs-the-Rest Loss to Focus on Important Samples in Adversarial Training Authors: Sekitoshi Kanai, Shin'ya Yamaguchi, Masanori Yamada, Hiroshi Takahashi, Kentaro Ohno, Yasutoshi Ida | Published: 2022-07-21 | Updated: 2023-04-26 Adversarial ExampleAdaptive Adversarial TrainingHigh Difficulty Sample 2022.07.21 2025.05.28 Literature Database
How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28 Algorithm DesignAdversarial ExampleComputational Efficiency 2022.06.28 2025.05.28 Literature Database
Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective Authors: Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong | Published: 2022-06-24 | Updated: 2022-10-11 Algorithm DesignFormal VerificationAdversarial Example 2022.06.24 2025.05.28 Literature Database
The Role of Machine Learning in Cybersecurity Authors: Giovanni Apruzzese, Pavel Laskov, Edgardo Montes de Oca, Wissam Mallouli, Luis Burdalo Rapa, Athanasios Vasileios Grammatopoulos, Fabio Di Franco | Published: 2022-06-20 Issues with Commercial ML ProductsAdversarial ExampleRole of Machine Learning 2022.06.20 2025.05.28 Literature Database
On the Role of Generalization in Transferability of Adversarial Examples Authors: Yilin Wang, Farzan Farnia | Published: 2022-06-18 Impact of GeneralizationPerformance EvaluationAdversarial Example 2022.06.18 2025.05.28 Literature Database