Alert button
Picture for Saurabh Shintre

Saurabh Shintre

Alert button

Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection

Add code
Bookmark button
Alert button
Dec 19, 2019
Mahmood Sharif, Keane Lucas, Lujo Bauer, Michael K. Reiter, Saurabh Shintre

Figure 1 for Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
Figure 2 for Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
Figure 3 for Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
Figure 4 for Optimization-Guided Binary Diversification to Mislead Neural Networks for Malware Detection
Viaarxiv icon

Deep Detector Health Management under Adversarial Campaigns

Add code
Bookmark button
Alert button
Nov 19, 2019
Javier Echauz, Keith Kenemer, Sarfaraz Hussein, Jay Dhaliwal, Saurabh Shintre, Slawomir Grzonkowski, Andrew Gardner

Figure 1 for Deep Detector Health Management under Adversarial Campaigns
Figure 2 for Deep Detector Health Management under Adversarial Campaigns
Figure 3 for Deep Detector Health Management under Adversarial Campaigns
Figure 4 for Deep Detector Health Management under Adversarial Campaigns
Viaarxiv icon

Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning

Add code
Bookmark button
Alert button
Jun 27, 2018
Jasjeet Dhaliwal, Saurabh Shintre

Figure 1 for Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
Figure 2 for Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
Figure 3 for Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
Figure 4 for Gradient Similarity: An Explainable Approach to Detect Adversarial Attacks against Deep Learning
Viaarxiv icon

Detecting Adversarial Samples from Artifacts

Add code
Bookmark button
Alert button
Nov 15, 2017
Reuben Feinman, Ryan R. Curtin, Saurabh Shintre, Andrew B. Gardner

Figure 1 for Detecting Adversarial Samples from Artifacts
Figure 2 for Detecting Adversarial Samples from Artifacts
Figure 3 for Detecting Adversarial Samples from Artifacts
Figure 4 for Detecting Adversarial Samples from Artifacts
Viaarxiv icon