Twitter Spam Detection: A Systematic Review Authors: Sepideh Bazzaz Abkenar, Mostafa Haghi Kashani, Mohammad Akbari, Ebrahim Mahdipour | Published: 2020-11-30 | Updated: 2020-12-01 Spam Detection MethodUser Behavior AnalysisResearch Methodology 2020.11.30 2025.05.28 Literature Database
Where Does the Robustness Come from? A Study of the Transformation-based Ensemble Defence Authors: Chang Liao, Yao Cheng, Chengfang Fang, Jie Shi | Published: 2020-09-28 | Updated: 2020-10-08 Relationship between Robustness and PrivacyVulnerability of Adversarial ExamplesResearch Methodology 2020.09.28 2025.05.28 Literature Database
Black-box Adversarial Sample Generation Based on Differential Evolution Authors: Junyu Lin, Lei Xu, Yingqi Liu, Xiangyu Zhang | Published: 2020-07-30 Attack MethodDeep LearningResearch Methodology 2020.07.30 2025.05.28 Literature Database
Enhancing Certified Robustness via Smoothed Weighted Ensembling Authors: Chizhou Liu, Yunzhen Feng, Ranran Wang, Bin Dong | Published: 2020-05-19 | Updated: 2021-02-23 AlgorithmGeneralization PerformanceResearch Methodology 2020.05.19 2025.05.28 Literature Database
Secondary Use of Electronic Health Record: Opportunities and Challenges Authors: Shahid Munir Shah, Rizwan Ahmed Khan | Published: 2020-01-26 Privacy Enhancing TechnologyResearch MethodologyClinical Research 2020.01.26 2025.05.28 Literature Database
Universal Adversarial Attack on Attention and the Resulting Dataset DAmageNet Authors: Sizhe Chen, Zhengbao He, Chengjin Sun, Jie Yang, Xiaolin Huang | Published: 2020-01-16 | Updated: 2020-10-21 Adversarial LearningAdversarial Attack DetectionResearch Methodology 2020.01.16 2025.05.28 Literature Database
An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26 PoisoningAdversarial ExampleResearch Methodology 2019.11.26 2025.05.28 Literature Database
Host-based anomaly detection using Eigentraces feature extraction and one-class classification on system call trace data Authors: Ehsan Aghaei, Gursel Serpen | Published: 2019-11-25 Model Performance EvaluationDeep Learning-Based IDSResearch Methodology 2019.11.25 2025.05.28 Literature Database
Adversarial Attack with Pattern Replacement Authors: Ziang Dong, Liang Mao, Shiliang Sun | Published: 2019-11-25 Model DesignAdversarial Attack MethodsResearch Methodology 2019.11.25 2025.05.28 Literature Database
Invert and Defend: Model-based Approximate Inversion of Generative Adversarial Networks for Secure Inference Authors: Wei-An Lin, Yogesh Balaji, Pouya Samangouei, Rama Chellappa | Published: 2019-11-23 Model DesignAdversarial Attack MethodsResearch Methodology 2019.11.23 2025.05.28 Literature Database