Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06 Class ImbalanceData PreprocessingVulnerability Analysis 2021.05.06 2025.05.28 Literature Database
An Overview of Laser Injection against Embedded Neural Network Models Authors: Mathieu Dumont, Pierre-Alain Moellic, Raphael Viera, Jean-Max Dutertre, Rémi Bernhard | Published: 2021-05-04 Hardware SecurityVulnerability of Adversarial ExamplesVulnerability Analysis 2021.05.04 2025.05.28 Literature Database
Who’s Afraid of Adversarial Transferability? Authors: Ziv Katzir, Yuval Elovici | Published: 2021-05-02 | Updated: 2022-10-06 Adversarial ExampleVulnerability of Adversarial ExamplesVulnerability Analysis 2021.05.02 2025.05.28 Literature Database
Stealthy Backdoors as Compression Artifacts Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | Published: 2021-04-30 Backdoor AttackRisks of Model CompressionVulnerability Analysis 2021.04.30 2025.05.28 Literature Database
Automated Software Vulnerability Assessment with Concept Drift Authors: Triet H. M. Le, Bushra Sabir, M. Ali Babar | Published: 2021-03-21 Performance EvaluationConcept DriftVulnerability Analysis 2021.03.21 2025.05.28 Literature Database
Diagnosing Vulnerability of Variational Auto-Encoders to Adversarial Attacks Authors: Anna Kuzina, Max Welling, Jakub M. Tomczak | Published: 2021-03-10 | Updated: 2021-05-06 Model Performance EvaluationAdversarial attackVulnerability Analysis 2021.03.10 2025.05.28 Literature Database
Finding Effective Security Strategies through Reinforcement Learning and Self-Play Authors: Kim Hammar, Rolf Stadler | Published: 2020-09-17 | Updated: 2020-10-04 Game TheoryDeep Reinforcement LearningVulnerability Analysis 2020.09.17 2025.05.28 Literature Database
On the relationship between class selectivity, dimensionality, and robustness Authors: Matthew L. Leavitt, Ari S. Morcos | Published: 2020-07-08 | Updated: 2020-10-13 PoisoningAdversarial LearningVulnerability Analysis 2020.07.08 2025.05.28 Literature Database
Hidden Cost of Randomized Smoothing Authors: Jeet Mohapatra, Ching-Yun Ko, Tsui-Wei, Weng, Sijia Liu, Pin-Yu Chen, Luca Daniel | Published: 2020-03-02 | Updated: 2021-03-12 Robustness EvaluationOptimization MethodsVulnerability Analysis 2020.03.02 2025.05.28 Literature Database
Automatic Perturbation Analysis for Scalable Certified Robustness and Beyond Authors: Kaidi Xu, Zhouxing Shi, Huan Zhang, Yihan Wang, Kai-Wei Chang, Minlie Huang, Bhavya Kailkhura, Xue Lin, Cho-Jui Hsieh | Published: 2020-02-28 | Updated: 2020-10-26 Robustness EvaluationVulnerability AnalysisDefense Method 2020.02.28 2025.05.28 Literature Database