mainly collected from security conferences and journals,aiming at machine learning model security
year | conf/jour | zone | title | topic |
---|---|---|---|---|
2017 | ESORICS | CCF-B | Adversarial examples for malware detection | AE |
2017 | Evading machine learning malware detection | |||
2017 | Generating adversarial malware examples for black-box attacks based on GAN | GAN | ||
2017 | KDD | CCF-A | Adversary resistant deep neural networks with an application to malware detection | AE |
2018 | Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables | |||
2018 | CoRR | Deceiving end-to-end deep learning malware detectors using adversarial examples | AE | |
2017 | RAID | CCF-B | Generic Black-Box End-to-End Attack Against State of the Art API Call Based Malware Classifiers | |
2018 | CCF-B | Zero-day malware detection using transferred generative adversarial networks based on deep autoencoders | ||
2019 | USENIX Securit | CCF-A | CT-GAN: Malicious Tampering of 3D Medical Imagery using Deep Learning | GAN |
2019 | USENIX Securit | CCF-A | Misleading Authorship Attribution of Source Code using Adversarial Learning | AE |
2019 | USENIX Securit | CCF-A | Why Do Adversarial Attacks Transfer? Explaining Transferability of Evasion and Poisoning Attacks | |
2018 | USENIX Securit | CCF-A | AttriGuard: A Practical Defense Against Attribute Inference Attacks via Adversarial Machine Learning | |
2018 | USENIX Securit | CCF-A | A4NT: Author Attribute Anonymity by Adversarial Training of Neural Machine Translation | |
2018 | USENIX Securit | CCF-A | Formal Security Analysis of Neural Networks using Symbolic Intervals | AE |
2016 | USENIX Securit | CCF-A | Stealing Machine Learning Models via Prediction APIs | |
2019 | USENIX Securit | CCF-A | Seeing is Not Believing: Camouflage Attacks on Image Scaling Algorithms | AE,IMAGE |
2019 | TIFS | CCF-A | GANobfuscator: Mitigating Information Leakage Under GAN via Differential Privacy. | GAN,PI |
2019 | TIFS | CCF-A | FV-GAN: Finger Vein Representation Using Generative Adversarial Networks | GAN,IMAGE |
2018 | TIFS | CCF-A | CNN-Based Adversarial Embedding for Image Steganography | AE,IMAGE |
2017 | TIFS | CCF-A | No Bot Expects the DeepCAPTCHA! Introducing Immutable Adversarial Examples, With Applications to CAPTCHA Generation | |
2017 | TIFS | CCF-A | A Game-Theoretic Analysis of Adversarial Classification | AE |
2018 | CCS | CCF-A | Yet Another Text Captcha Solver: A Generative Adversarial Network Based Approach | |
2018 | CCS | CCF-A | Machine Learning with Membership Privacy using Adversarial Regularization | AE,PI |
2018 | CCS | CCF-A | Tutorials:Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning | AE |
2018 | CCS | CCF-A | Towards Understanding the Dynamics of Adversarial Attacks | AE |
2018 | CCS | CCF-A | Adversarial Product Review Generation with Word Replacements | AE,NLP |
2018 | CCS | CCF-A | Spartan Networks: Self-Feature-Squeezing Networks for Increased Robustness in Adversarial Settings | |
2017 | CCS | CCF-A | DolphinAttack: Inaudible Voice Commands | AE |
2017 | CCS | CCF-A | Evading Classifiers by Morphing in the Dark | AE |
2017 | CCS | CCF-A | MagNet: A Two-Pronged Defense against Adversarial Examples | AE |
2017 | CCS | CCF-A | Practical Attacks Against Graph-based Clustering | AE,IMAGE |
2017 | CCS | CCF-A | Automated Crowdturfing Attacks and Defenses in Online Review Systems | AE,NLP |
2017 | CCS | CCF-A | POISED: Spotting Twitter Spam Off the Beaten Paths | AE,NLP |
2017 | CCS | CCF-A | Poster: Adversarial Examples for Classifiers in High-Dimensional Network Data. | AE |
2017 | CCS | CCF-A | Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning | |
2016 | CCS | CCF-A | Tutorials:Adversarial Data Mining: Big Data Meets Cyber Security. | AE |
2016 | S&P | CCF-A | Distillation as a Defense to Adversarial Perturbations Against Deep Neural Networks | AE |
2019 | AAAI | CCF-A | MIGAN: Malware Image Synthesis Using GANs. | GAN |