Against Membership Inference Attack: Pruning is All You Need Authors: Yijue Wang, Chenghong Wang, Zigeng Wang, Shanglin Zhou, Hang Liu, Jinbo Bi, Caiwen Ding, Sanguthevar Rajasekaran | Published: 2020-08-28 | Updated: 2021-07-04 Membership InferenceAdversarial attackDeep Learning Technology 2020.08.28 2025.05.28 Literature Database
Adversarial Eigen Attack on Black-Box Models Authors: Linjun Zhou, Peng Cui, Yinan Jiang, Shiqiang Yang | Published: 2020-08-27 Adversarial attackOptimization StrategyDeep Learning Technology 2020.08.27 2025.05.28 Literature Database
Universalization of any adversarial attack using very few test examples Authors: Sandesh Kamath, Amit Deshpande, K V Subrahmanyam, Vineeth N Balasubramanian | Published: 2020-05-18 | Updated: 2022-10-28 Performance Evaluation MetricsAdversarial ExampleDeep Learning Technology 2020.05.18 2025.05.28 Literature Database
NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips Authors: Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique | Published: 2020-05-16 Performance Evaluation MetricsMachine Learning MethodDeep Learning Technology 2020.05.16 2025.05.28 Literature Database
A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification Authors: Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen | Published: 2020-05-14 | Updated: 2020-05-15 Graph Representation LearningMalware Detection MethodDeep Learning Technology 2020.05.14 2025.05.28 Literature Database
Transferable Perturbations of Deep Feature Distributions Authors: Nathan Inkawhich, Kevin J Liang, Lawrence Carin, Yiran Chen | Published: 2020-04-27 Multi-Class ClassificationAdversarial Attack MethodsDeep Learning Technology 2020.04.27 2025.05.28 Literature Database
Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks Authors: Kang Liu, Benjamin Tan, Gaurav Rajavendra Reddy, Siddharth Garg, Yiorgos Makris, Ramesh Karri | Published: 2020-04-26 PoisoningDeep Learning TechnologyEffectiveness Analysis of Defense Methods 2020.04.26 2025.05.28 Literature Database
Privacy in Deep Learning: A Survey Authors: Fatemehsadat Mireshghallah, Mohammadkazem Taram, Praneeth Vepakomma, Abhishek Singh, Ramesh Raskar, Hadi Esmaeilzadeh | Published: 2020-04-25 | Updated: 2020-11-07 Privacy Enhancing TechnologyMembership InferenceDeep Learning Technology 2020.04.25 2025.05.28 Literature Database
Live Trojan Attacks on Deep Neural Networks Authors: Robby Costales, Chengzhi Mao, Raphael Norwitz, Bryan Kim, Junfeng Yang | Published: 2020-04-22 | Updated: 2020-05-27 Trojan DetectionAttack MethodDeep Learning Technology 2020.04.22 2025.05.28 Literature Database
An Adaptive and Fast Convergent Approach to Differentially Private Deep Learning Authors: Zhiying Xu, Shuyu Shi, Alex X. Liu, Jun Zhao, Lin Chen | Published: 2019-12-19 Privacy-Preserving AlgorithmPrivacy Protection MechanismDeep Learning Technology 2019.12.19 2025.05.28 Literature Database