Research Methodology

Twitter Spam Detection: A Systematic Review

Authors: Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, Ebrahim Mahdipour | Published: 2020-11-30 | Updated: 2020-12-01
Spam Detection Method
User Behavior Analysis
Research Methodology

Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence

Authors: Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi | Published: 2020-09-28 | Updated: 2020-10-08
Relationship between Robustness and Privacy
Vulnerability of Adversarial Examples
Research Methodology

Black-box Adversarial Sample Generation Based on Differential Evolution

Authors: Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang | Published: 2020-07-30
Attack Method
Deep Learning
Research Methodology

Enhancing Certified Robustness via Smoothed Weighted Ensembling

Authors: Chizhou Liu, Yunzhen Feng, Ranran Wang, Bin Dong | Published: 2020-05-19 | Updated: 2021-02-23
Algorithm
Generalization Performance
Research Methodology

Secondary Use of Electronic Health Record: Opportunities and Challenges

Authors: Shahid Munir Shah, Rizwan Ahmed Khan | Published: 2020-01-26
Privacy Enhancing Technology
Research Methodology
Clinical Research

Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet

Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21
Adversarial Learning
Adversarial Attack Detection
Research Methodology

An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense

Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26
Poisoning
Adversarial Example
Research Methodology

Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data

Authors: Ehsan Aghaei, Gursel Serpen | Published: 2019-11-25
Model Performance Evaluation
Deep Learning-Based IDS
Research Methodology

Adversarial Attack with Pattern Replacement

Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25
Model Design
Adversarial Attack Methods
Research Methodology

Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference

Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23
Model Design
Adversarial Attack Methods
Research Methodology