Responses to Critiques on Machine Learning of Criminality Perceptions (Addendum of arXiv:1611.04135) Authors: Xiaolin Wu, Xi Zhang | Published: 2016-11-13 | Updated: 2017-05-26 犯罪予測Attack that Analyzes Images with AI to Infer Personal InformationImage Processing 2016.11.13 2026.05.01 Literature Database
Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods Authors: Thai Pham, Steven Lee | Published: 2016-11-12 | Updated: 2017-02-25 Blockchain TechnologyEarly Detection MethodHigh-Dimensional Data Analysis 2016.11.12 2026.05.01 Literature Database
Towards the Science of Security and Privacy in Machine Learning Authors: Nicolas Papernot, Patrick McDaniel, Arunesh Sinha, Michael Wellman | Published: 2016-11-11 Privacy-Preserving Machine LearningPoisoningDefense Method 2016.11.11 2026.05.01 Literature Database
SoK: Applying Machine Learning in Security – A Survey Authors: Heju Jiang, Jasvir Nagra, Parvez Ahammad | Published: 2016-11-10 Model Extraction AttackRisk AssessmentAttack Detection Method 2016.11.10 2026.05.01 Literature Database
Learning from Untrusted Data Authors: Moses Charikar, Jacob Steinhardt, Gregory Valiant | Published: 2016-11-07 | Updated: 2017-06-11 Model IdentificationWeight Update MethodHigh-Dimensional Data Processing 2016.11.07 2026.05.01 Literature Database
Adversarial Machine Learning at Scale Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio | Published: 2016-11-04 | Updated: 2017-02-11 Certified RobustnessAdversarial LearningRobustness of Deep Networks 2016.11.04 2026.05.01 Literature Database
PrivLogit: Efficient Privacy-preserving Logistic Regression by Tailoring Numerical Optimizers Authors: Wei Xie, Yang Wang, Steven M. Boker, Donald E. Brown | Published: 2016-11-03 Secure AggregationPrivacy-Preserving Machine LearningSelection and Evaluation of Optimization Algorithms 2016.11.03 2026.05.01 Literature Database
Differentially Private Variational Inference for Non-conjugate Models Authors: Joonas Jälkö, Onur Dikmen, Antti Honkela | Published: 2016-10-27 | Updated: 2017-04-10 Privacy ProtectionPrivacy-Preserving Machine LearningDifferential Privacy 2016.10.27 2026.05.01 Literature Database
A multi-task learning model for malware classification with useful file access pattern from API call sequence Authors: Xin Wang, Siu Ming Yiu | Published: 2016-10-19 API SecurityMalware ClassificationModel Identification 2016.10.19 2026.05.01 Literature Database
Membership Inference Attacks against Machine Learning Models Authors: Reza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov | Published: 2016-10-18 | Updated: 2017-03-31 Trigger DetectionPrivacy-Preserving Machine LearningMembership Inference 2016.10.18 2026.05.01 Literature Database