CSI: A Hybrid Deep Model for Fake News Detection

Authors: Natali Ruchansky, Sungyong Seo, Yan Liu | Published: 2017-03-20 | Updated: 2017-09-03

Counterfactual Fairness

Authors: Matt J. Kusner, Joshua R. Loftus, Chris Russell, Ricardo Silva | Published: 2017-03-20 | Updated: 2018-03-08

Fraternal Twins: Unifying Attacks on Machine Learning and Digital Watermarking

Authors: Erwin Quiring, Daniel Arp, Konrad Rieck | Published: 2017-03-16

Understanding Black-box Predictions via Influence Functions

Authors: Pang Wei Koh, Percy Liang | Published: 2017-03-14 | Updated: 2020-12-29

Implicit Sensor-based Authentication of Smartphone Users with Smartwatch

Authors: Wei-Han Lee, Ruby Lee | Published: 2017-03-10

Tactics of Adversarial Attack on Deep Reinforcement Learning Agents

Authors: Yen-Chen Lin, Zhang-Wei Hong, Yuan-Hong Liao, Meng-Li Shih, Ming-Yu Liu, Min Sun | Published: 2017-03-08 | Updated: 2019-11-13

Generative Poisoning Attack Method Against Neural Networks

Authors: Chaofei Yang, Qing Wu, Hai Li, Yiran Chen | Published: 2017-03-03

Differentially Private Bayesian Learning on Distributed Data

Authors: Mikko Heikkilä, Eemil Lagerspetz, Samuel Kaski, Kana Shimizu, Sasu Tarkoma, Antti Honkela | Published: 2017-03-03 | Updated: 2017-05-29