Picture for Saurabh Shintre

Saurabh Shintre

Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection

Add code
Dec 19, 2019
Figure 1 for Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
Figure 2 for Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
Figure 3 for Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
Figure 4 for Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
Viaarxiv icon

Deep Detector Health Management under Adversarial Campaigns

Add code
Nov 19, 2019
Figure 1 for Deep Detector Health Management under Adversarial Campaigns
Figure 2 for Deep Detector Health Management under Adversarial Campaigns
Figure 3 for Deep Detector Health Management under Adversarial Campaigns
Figure 4 for Deep Detector Health Management under Adversarial Campaigns
Viaarxiv icon

Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning

Add code
Jun 27, 2018
Figure 1 for Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
Figure 2 for Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
Figure 3 for Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
Figure 4 for Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
Viaarxiv icon

Detecting Adversarial Samples from Artifacts

Add code
Nov 15, 2017
Figure 1 for Detecting Adversarial Samples from Artifacts
Figure 2 for Detecting Adversarial Samples from Artifacts
Figure 3 for Detecting Adversarial Samples from Artifacts
Figure 4 for Detecting Adversarial Samples from Artifacts
Viaarxiv icon