Deep Learning Method

Can deepfakes be created by novice users?

Authors: Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt | Published: 2023-04-28
Analysis of Detection Methods
Deep Learning Method
Challenges of Generative Models

Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks

Authors: Mahnoor Shahid | Published: 2023-04-27
Analysis of Detection Methods
Machine Learning Method
Deep Learning Method

The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11
DNN IP Protection Method
Poisoning
Deep Learning Method

DetectGPT: Zero-Shot Machine-Generated Text Detection using Probability Curvature

Authors: Eric Mitchell, Yoonho Lee, Alexander Khazatsky, Christopher D. Manning, Chelsea Finn | Published: 2023-01-26 | Updated: 2023-07-23
Identification of AI Output
Text Perturbation Method
Deep Learning Method

Evolution of Neural Tangent Kernels under Benign and Adversarial Training

Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21
Adversarial Example
Adversarial Attack Methods
Deep Learning Method

Scaling Adversarial Training to Large Perturbation Bounds

Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18
Adversarial Example
Adversarial Attack Methods
Deep Learning Method

DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling

Authors: Jianxin Wei, Ergute Bao, Xiaokui Xiao, Yin Yang | Published: 2022-10-18 | Updated: 2024-08-01
Privacy Analysis
Privacy Assessment
Deep Learning Method

DI-NIDS: Domain Invariant Network Intrusion Detection System

Authors: Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann | Published: 2022-10-15
Performance Evaluation
Machine Learning Technology
Deep Learning Method

COLLIDER: A Robust Training Framework for Backdoor Data

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2022-10-13
Core Set Selection Method
Deep Learning Method
Defense Method

Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet Detection

Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Muhammad Khalid, Husnain Rafiq | Published: 2022-10-06
Data Generation
Reinforcement Learning
Deep Learning Method