Beyond Explainability: Leveraging Interpretability for Improved Adversarial Learning Authors: Devinder Kumar, Ibrahim Ben-Daya, Kanav Vats, Jeffery Feng, Graham Taylor and, Alexander Wong | Published: 2019-04-21 Attack EvaluationAdversarial TrainingMachine Learning Technology 2019.04.21 2025.05.28 Literature Database
On the Limitation of Local Intrinsic Dimensionality for Characterizing the Subspaces of Adversarial Examples Authors: Pei-Hsuan Lu, Pin-Yu Chen, Chia-Mu Yu | Published: 2018-03-26 Adversarial Example DetectionAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.26 2025.05.28 Literature Database
Clipping free attacks against artificial neural networks Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28 Adversarial Example DetectionAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.26 2025.05.28 Literature Database
Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24 Exploratory AttackAdversarial Perturbation TechniquesMachine Learning Technology 2018.03.24 2025.05.28 Literature Database
Explaining Black-box Android Malware Detection Authors: Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2018-03-09 | Updated: 2018-10-29 Machine Learning TechnologyFeature Importance AnalysisStatic Malware Detection 2018.03.09 2025.05.28 Literature Database
Stochastic Activation Pruning for Robust Adversarial Defense Authors: Guneet S. Dhillon, Kamyar Azizzadenesheli, Zachary C. Lipton, Jeremy Bernstein, Jean Kossaifi, Aran Khanna, Anima Anandkumar | Published: 2018-03-05 Adversarial Example DetectionAdversarial LearningMachine Learning Technology 2018.03.05 2025.05.28 Literature Database
Label Sanitization against Label Flipping Poisoning Attacks Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02 Adversarial Attack AnalysisMachine Learning TechnologyDetection of Poisonous Data 2018.03.02 2025.05.28 Literature Database
Online Feature Ranking for Intrusion Detection Systems Authors: Buse Gul Atli, Alexander Jung | Published: 2018-03-01 | Updated: 2018-06-15 ML-Based IDSData Collection MethodMachine Learning Technology 2018.03.01 2025.05.28 Literature Database
Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27 Data CollectionModel evaluation methodsMachine Learning Technology 2018.02.27 2025.05.28 Literature Database
Generalized Byzantine-tolerant SGD Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-02-27 | Updated: 2018-03-23 Robust EstimationAdversarial Attack AnalysisMachine Learning Technology 2018.02.27 2025.05.28 Literature Database