STC Antispoofing Systems for the ASVspoof2019 Challenge Authors: Galina Lavrentyeva, Sergey Novoselov, Andzhukaev Tseren, Marina Volkova, Artem Gorlanov, Alexandr Kozlov | Published: 2019-04-11 Deep Learning TechnologyFeature Extraction MethodSpeech Synthesis Technology 2019.04.11 2025.05.28 Literature Database
A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29 Model evaluation methodsAdversarial Attack MethodsDeep Learning Technology 2019.04.08 2025.05.28 Literature Database
Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions Authors: Li Chen | Published: 2019-04-03 Malware DetectionFuture ResearchDeep Learning Technology 2019.04.03 2025.05.28 Literature Database
Robustness of Generalized Learning Vector Quantization Models against Adversarial Attacks Authors: Sascha Saralajew, Lars Holdijk, Maike Rees, Thomas Villmann | Published: 2019-02-01 | Updated: 2019-03-09 Robustness ImprovementAdversarial attackDeep Learning Technology 2019.02.01 2025.05.28 Literature Database
Exposing Deep Fakes Using Inconsistent Head Poses Authors: Xin Yang, Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2018-11-13 Detection of DeepfakesMedia ForensicsDeep Learning Technology 2018.11.01 2025.05.28 Literature Database
Exposing DeepFake Videos By Detecting Face Warping Artifacts Authors: Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2019-05-22 Data Augmentation MethodDetection of DeepfakesDeep Learning Technology 2018.11.01 2025.05.28 Literature Database
Adversarial Distillation of Bayesian Neural Network Posteriors Authors: Kuan-Chieh Wang, Paul Vicol, James Lucas, Li Gu, Roger Grosse, Richard Zemel | Published: 2018-06-27 Certified RobustnessAdversarial ExampleDeep Learning Technology 2018.06.27 2025.05.28 Literature Database
Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment Authors: Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan | Published: 2018-06-19 CybersecurityDeep Learning Technology 2018.06.19 2025.05.28 Literature Database
Image classification and retrieval with random depthwise signed convolutional neural networks Authors: Yunzhe Xue, Usman Roshan | Published: 2018-06-15 | Updated: 2019-03-15 Deep Learning TechnologyImage Classification Method 2018.06.15 2025.05.28 Literature Database
Hardware Trojan Attacks on Neural Networks Authors: Joseph Clements, Yingjie Lao | Published: 2018-06-14 Trigger DetectionAdversarial ExampleDeep Learning Technology 2018.06.14 2025.05.28 Literature Database