Deep Learning Technology

STC Antispoofing Systems for the ASVspoof2019 Challenge

Authors: Galina Lavrentyeva, Sergey Novoselov, Andzhukaev Tseren, Marina Volkova, Artem Gorlanov, Alexandr Kozlov | Published: 2019-04-11
Deep Learning Technology
Feature Extraction Method
Speech Synthesis Technology

A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning

Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29
Model evaluation methods
Adversarial Attack Methods
Deep Learning Technology

Understanding the efficacy, reliability and resiliency of computer vision techniques for malware detection and future research directions

Authors: Li Chen | Published: 2019-04-03
Malware Detection
Future Research
Deep Learning Technology

Robustness of Generalized Learning Vector Quantization Models against Adversarial Attacks

Authors: Sascha Saralajew, Lars Holdijk, Maike Rees, Thomas Villmann | Published: 2019-02-01 | Updated: 2019-03-09
Robustness Improvement
Adversarial attack
Deep Learning Technology

Exposing Deep Fakes Using Inconsistent Head Poses

Authors: Xin Yang, Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2018-11-13
Detection of Deepfakes
Media Forensics
Deep Learning Technology

Exposing DeepFake Videos By Detecting Face Warping Artifacts

Authors: Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2019-05-22
Data Augmentation Method
Detection of Deepfakes
Deep Learning Technology

Adversarial Distillation of Bayesian Neural Network Posteriors

Authors: Kuan-Chieh Wang, Paul Vicol, James Lucas, Li Gu, Roger Grosse, Richard Zemel | Published: 2018-06-27
Certified Robustness
Adversarial Example
Deep Learning Technology

Effect of Hyper-Parameter Optimization on the Deep Learning Model Proposed for Distributed Attack Detection in Internet of Things Environment

Authors: Md Mohaimenuzzaman, Zahraa Said Abdallah, Joarder Kamruzzaman, Bala Srinivasan | Published: 2018-06-19
Cybersecurity
Deep Learning Technology

Image classification and retrieval with random depthwise signed convolutional neural networks

Authors: Yunzhe Xue, Usman Roshan | Published: 2018-06-15 | Updated: 2019-03-15
Deep Learning Technology
Image Classification Method

Hardware Trojan Attacks on Neural Networks

Authors: Joseph Clements, Yingjie Lao | Published: 2018-06-14
Trigger Detection
Adversarial Example
Deep Learning Technology