Active Learning Under Malicious Mislabeling and Poisoning Attacks

Authors: Jing Lin, Ryan Luley, Kaiqi Xiong | Published: 2021-01-01 | Updated: 2021-09-02

Stack-based Buffer Overflow Detection using Recurrent Neural Networks

Authors: William Arild Dahl, Laszlo Erdodi, Fabio Massimo Zennaro | Published: 2020-12-30

With False Friends Like These, Who Can Notice Mistakes?

Authors: Lue Tao, Lei Feng, Jinfeng Yi, Songcan Chen | Published: 2020-12-29 | Updated: 2021-12-13

Phishing Detection through Email Embeddings

Authors: Luis Felipe Gutiérrez, Faranak Abri, Miriam Armstrong, Akbar Siami Namin, Keith S. Jones | Published: 2020-12-28

Implementation of Security Systems for Detection and Prevention of Data Loss/Leakage at Organization via Traffic Inspection

Authors: Mir Hassan, Chen Jincai, Adnan Iftekhar, Adnan Shehzad, Xiaohui Cui | Published: 2020-12-28

Predicting Organizational Cybersecurity Risk: A Deep Learning Approach

Authors: Benjamin M. Ampel | Published: 2020-12-26

Robustness, Privacy, and Generalization of Adversarial Training

Authors: Fengxiang He, Shaopeng Fu, Bohan Wang, Dacheng Tao | Published: 2020-12-25

Gradient-Free Adversarial Attacks for Bayesian Neural Networks

Authors: Matthew Yuan, Matthew Wicker, Luca Laurenti | Published: 2020-12-23

Selective Forgetting of Deep Networks at a Finer Level than Samples

Authors: Tomohiro Hayase, Suguru Yasutomi, Takashi Katoh | Published: 2020-12-22 | Updated: 2020-12-31

Zeroth-Order Hybrid Gradient Descent: Towards A Principled Black-Box Optimization Framework

Authors: Pranay Sharma, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Xue Lin, Pramod K. Varshney | Published: 2020-12-21