Skip to Main Content Area
CPS-VO
Contact Support
Browse
Calendar
Announcements
Repositories
Groups
Search
Search for Content
Search for a Group
Search for People
Search for a Project
Tagcloud
› Go to login screen
Not a member?
Click here to register!
Forgot username or password?
Cyber-Physical Systems Virtual Organization
Read-only archive of site from September 29, 2023.
CPS-VO
black-box attacks
biblio
Towards Black-Box Adversarial Attacks on Interpretable Deep Learning Systems
Submitted by aekwall on Tue, 12/20/2022 - 4:20pm
security
Neural networks
deep learning
pubcrawl
Metrics
Resiliency
composability
black-box attacks
adversarial examples
Multimedia systems
White Box Security
Interpretable deep learning systems
biblio
Resiliency of SNN on Black-Box Adversarial Attacks
Submitted by grigby1 on Fri, 11/18/2022 - 4:44pm
neural network resiliency
SpiNNaker
spiking neural network
Neuromorphics
black-box attacks
Deep Neural Network
Robustness
adversarial attacks
Hardware
Software
Conferences
Resiliency
resilience
pubcrawl
Neural networks
machine learning
biblio
Attacking Black-box Recommendations via Copying Cross-domain User Profiles
Submitted by grigby1 on Fri, 07/15/2022 - 11:22am
deep learning
Neural networks
pubcrawl
Human behavior
resilience
Resiliency
Conferences
Scalability
Data models
adversarial attacks
recommender systems
Reinforcement learning
Data engineering
data poisoning attacks
black-box attacks
cross-domain
biblio
Encrypted-Input Program Obfuscation: Simultaneous Security Against White-Box and Black-Box Attacks
Submitted by grigby1 on Thu, 03/04/2021 - 1:33pm
pubcrawl
Logic gates
machine learning
machine learning as a service
machine learning programs
Metrics
program confidentiality
program obfuscation
provable program obfuscation solution
learning (artificial intelligence)
range membership programs
resilience
security
traditional cryptographic program obfuscation model
white box
white box cryptography
White Box Security
white-box attacks
cloud services
Resiliency
Predictive Metrics
Compositionality
Black Box Attacks
black box encryption
black-box attacks
Cloud Computing
cloud programs
provable security
composability
Computational modeling
Cryptography
data privacy
Decision trees
encrypted-input program obfuscation
encryption
equivalent unobfuscated program
biblio
On the Design of Black-Box Adversarial Examples by Leveraging Gradient-Free Optimization and Operator Splitting Method
Submitted by grigby1 on Fri, 09/04/2020 - 3:10pm
distortion metrics
advanced AI platforms
alternating direction method of multipliers
Bayesian optimization
black-box adversarial attack generation methods
black-box adversarial examples
black-box attacks
BO-ADMM
competitive attack success rates
Convex functions
ADMM solution framework
gradient-free optimization
gradient-free regime
operator splitting method
query complexities
Robust machine learning
zeroth-order optimization
ZO-ADMM
Black Box Security
Complexity theory
optimisation
pubcrawl
composability
Metrics
Resiliency
resilience
learning (artificial intelligence)
optimization
security of data
distortion
Perturbation methods
image classification
Bayes methods
image retrieval
black-box adversarial attacks
Measurement
estimation
biblio
Adversarial Defense via Learning to Generate Diverse Attacks
Submitted by grigby1 on Fri, 04/17/2020 - 9:58am
neural nets
White Box Security
Training
stochastic generator
security of data
Robustness
Resiliency
resilience
recursive generator
pubcrawl
Perturbation methods
pattern classification
optimization
one-shot perturbation
Neural networks
adversarial defense
Metrics
malicious attacks
machine learning
learning (artificial intelligence)
Generators
deterministic generator
deep neural networks
deep learning
Compositionality
composability
classification performance
black-box attacks
Adversarial training
biblio
Malware Evasion Attack and Defense
Submitted by grigby1 on Tue, 02/18/2020 - 10:53am
malware detection systems
white-box evasion attacks
White Box Security
white box cryptography
Training data
Training
security
Resiliency
resilience
pubcrawl
Perturbation methods
pattern classification
ML-based malware detector
ML classifier
Metrics
malware evasion attack
adversarial example
malware
machine learning classifiers
learning (artificial intelligence)
invasive software
grey-box evasion attacks
Evasion Attack
Detectors
defense approaches
defense
Data models
composability
black-box attacks
Adversarial Machine Learning
adversarial examples
biblio
Comprehensive Privacy Analysis of Deep Learning: Passive and Active White-Box Inference Attacks against Centralized and Federated Learning
Submitted by grigby1 on Tue, 02/18/2020 - 10:52am
Resiliency
Inference-Attacks
learning (artificial intelligence)
Membership-Inference
Metrics
neural nets
privacy
privacy leakage
pubcrawl
resilience
inference mechanisms
stochastic gradient descent algorithm
Stochastic processes
Stochastic-Gradient-Descent
Training
Training data
white box cryptography
White Box Security
white-box membership inference attacks
data privacy
active white-box inference attacks
black-box attacks
centralized learning
CIFAR dataset
composability
comprehensive privacy analysis
Computational modeling
Data models
active membership inference attacks
deep learning
deep learning models
deep neural networks
Deep-learning
federated learning setting
Federated-Learning
gradient methods
Inference algorithms
biblio
Fooling End-To-End Speaker Verification With Adversarial Examples
Submitted by aekwall on Wed, 01/16/2019 - 1:10pm
adversarial examples
White Box Security
YOHO
original speaker examples
NTIMIT
MFCC
Mel frequency cepstral coefficient
fooling end-to-end speaker verification
end-to-end deep neural models
deep end-to-end network
black-box attacks
automatic speaker verification systems
Automatic speaker verification
security of data
Perturbation methods
Neural networks
neural nets
Task Analysis
Training
speaker recognition
composability
Metrics
pubcrawl
resilience
standards