Deep Learning Technology

Against Membership Inference Attack: Pruning is All You Need

Authors: Yijue Wang, Chenghong Wang, Zigeng Wang, Shanglin Zhou, Hang Liu, Jinbo Bi, Caiwen Ding, Sanguthevar Rajasekaran | Published: 2020-08-28 | Updated: 2021-07-04
Membership Inference
Adversarial attack
Deep Learning Technology

Adversarial Eigen Attack on Black-Box Models

Authors: Linjun Zhou, Peng Cui, Yinan Jiang, Shiqiang Yang | Published: 2020-08-27
Adversarial attack
Optimization Strategy
Deep Learning Technology

Universalization of any adversarial attack using very few test examples

Authors: Sandesh Kamath, Amit Deshpande, K V Subrahmanyam, Vineeth N Balasubramanian | Published: 2020-05-18 | Updated: 2022-10-28
Performance Evaluation Metrics
Adversarial Example
Deep Learning Technology

NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips

Authors: Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique | Published: 2020-05-16
Performance Evaluation Metrics
Machine Learning Method
Deep Learning Technology

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification

Authors: Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen | Published: 2020-05-14 | Updated: 2020-05-15
Graph Representation Learning
Malware Detection Method
Deep Learning Technology

Transferable Perturbations of Deep Feature Distributions

Authors: Nathan Inkawhich, Kevin J Liang, Lawrence Carin, Yiran Chen | Published: 2020-04-27
Multi-Class Classification
Adversarial Attack Methods
Deep Learning Technology

Bias Busters: Robustifying DL-based Lithographic Hotspot Detectors Against Backdooring Attacks

Authors: Kang Liu, Benjamin Tan, Gaurav Rajavendra Reddy, Siddharth Garg, Yiorgos Makris, Ramesh Karri | Published: 2020-04-26
Poisoning
Deep Learning Technology
Effectiveness Analysis of Defense Methods

Privacy in Deep Learning: A Survey

Authors: Fatemehsadat Mireshghallah, Mohammadkazem Taram, Praneeth Vepakomma, Abhishek Singh, Ramesh Raskar, Hadi Esmaeilzadeh | Published: 2020-04-25 | Updated: 2020-11-07
Privacy Enhancing Technology
Membership Inference
Deep Learning Technology

Live Trojan Attacks on Deep Neural Networks

Authors: Robby Costales, Chengzhi Mao, Raphael Norwitz, Bryan Kim, Junfeng Yang | Published: 2020-04-22 | Updated: 2020-05-27
Trojan Detection
Attack Method
Deep Learning Technology

An Adaptive and Fast Convergent Approach to Differentially Private Deep Learning

Authors: Zhiying Xu, Shuyu Shi, Alex X. Liu, Jun Zhao, Lin Chen | Published: 2019-12-19
Privacy-Preserving Algorithm
Privacy Protection Mechanism
Deep Learning Technology