Finding Effective Security Strategies through Reinforcement Learning and Self-Play Authors: Kim Hammar, Rolf Stadler | Published: 2020-09-17 | Updated: 2020-10-04 Game TheoryDeep Reinforcement LearningVulnerability Analysis 2020.09.17 2025.05.28 Literature Database
On the relationship between class selectivity, dimensionality, and robustness Authors: Matthew L. Leavitt, Ari S. Morcos | Published: 2020-07-08 | Updated: 2020-10-13 PoisoningAdversarial LearningVulnerability Analysis 2020.07.08 2025.05.28 Literature Database
Hidden Cost of Randomized Smoothing Authors: Jeet Mohapatra, Ching-Yun Ko, Tsui-Wei, Weng, Sijia Liu, Pin-Yu Chen, Luca Daniel | Published: 2020-03-02 | Updated: 2021-03-12 Robustness EvaluationOptimization MethodsVulnerability Analysis 2020.03.02 2025.05.28 Literature Database
Automatic Perturbation Analysis for Scalable Certified Robustness and Beyond Authors: Kaidi Xu, Zhouxing Shi, Huan Zhang, Yihan Wang, Kai-Wei Chang, Minlie Huang, Bhavya Kailkhura, Xue Lin, Cho-Jui Hsieh | Published: 2020-02-28 | Updated: 2020-10-26 Robustness EvaluationVulnerability AnalysisDefense Method 2020.02.28 2025.05.28 Literature Database
Survey of Attacks and Defenses on Edge-Deployed Neural Networks Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27 Privacy-Preserving Data MiningAttack TypeVulnerability Analysis 2019.11.27 2025.05.28 Literature Database
Models and Framework for Adversarial Attacks on Complex Adaptive Systems Authors: Vahid Behzadan, Arslan Munir | Published: 2017-09-13 Reinforcement Learning AlgorithmAttack DetectionVulnerability Analysis 2017.09.13 2025.05.28 Literature Database
Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress) Authors: Ashish Kundu, Chinmay Kundu, Karan K. Budhraja | Published: 2017-04-10 Security Analysis MethodDevice Sensitivity AnalysisVulnerability Analysis 2017.04.10 2025.05.28 Literature Database