Can deepfakes be created by novice users? Authors: Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt | Published: 2023-04-28 Analysis of Detection MethodsDeep Learning MethodChallenges of Generative Models 2023.04.28 2025.05.28 Literature Database
Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks Authors: Mahnoor Shahid | Published: 2023-04-27 Analysis of Detection MethodsMachine Learning MethodDeep Learning Method 2023.04.27 2025.05.28 Literature Database
The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11 DNN IP Protection MethodPoisoningDeep Learning Method 2023.03.15 2025.05.28 Literature Database
DetectGPT: Zero-Shot Machine-Generated Text Detection using Probability Curvature Authors: Eric Mitchell, Yoonho Lee, Alexander Khazatsky, Christopher D. Manning, Chelsea Finn | Published: 2023-01-26 | Updated: 2023-07-23 Identification of AI OutputText Perturbation MethodDeep Learning Method 2023.01.26 2025.05.28 Literature Database
Evolution of Neural Tangent Kernels under Benign and Adversarial Training Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21 Adversarial ExampleAdversarial Attack MethodsDeep Learning Method 2022.10.21 2025.05.28 Literature Database
Scaling Adversarial Training to Large Perturbation Bounds Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18 Adversarial ExampleAdversarial Attack MethodsDeep Learning Method 2022.10.18 2025.05.28 Literature Database
DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling Authors: Jianxin Wei, Ergute Bao, Xiaokui Xiao, Yin Yang | Published: 2022-10-18 | Updated: 2024-08-01 Privacy AnalysisPrivacy AssessmentDeep Learning Method 2022.10.18 2025.05.28 Literature Database
DI-NIDS: Domain Invariant Network Intrusion Detection System Authors: Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann | Published: 2022-10-15 Performance EvaluationMachine Learning TechnologyDeep Learning Method 2022.10.15 2025.05.28 Literature Database
COLLIDER: A Robust Training Framework for Backdoor Data Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2022-10-13 Core Set Selection MethodDeep Learning MethodDefense Method 2022.10.13 2025.05.28 Literature Database
Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet Detection Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Muhammad Khalid, Husnain Rafiq | Published: 2022-10-06 Data GenerationReinforcement LearningDeep Learning Method 2022.10.06 2025.05.28 Literature Database