Downscaling Attack and Defense: Turning What You See Back Into What You Get

Authors: Andrew J. Lohn | Published: 2020-10-06 | Updated: 2020-10-07

Metadata-Based Detection of Child Sexual Abuse Material

Authors: Mayana Pereira, Rahul Dodhia, Hyrum Anderson, Richard Brown | Published: 2020-10-05 | Updated: 2021-10-27

Goal-directed Generation of Discrete Structures with Conditional Generative Models

Authors: Amina Mollaysa, Brooks Paige, Alexandros Kalousis | Published: 2020-10-05 | Updated: 2020-10-23

Adversarial Boot Camp: label free certified robustness in one epoch

Authors: Ryan Campbell, Chris Finlay, Adam M Oberman | Published: 2020-10-05

Understanding Catastrophic Overfitting in Single-step Adversarial Training

Authors: Hoki Kim, Woojin Lee, Jaewook Lee | Published: 2020-10-05 | Updated: 2020-12-15

Lipschitz Bounded Equilibrium Networks

Authors: Max Revay, Ruigang Wang, Ian R. Manchester | Published: 2020-10-05

A Generative Machine Learning Approach to Policy Optimization in Pursuit-Evasion Games

Authors: Shiva Navabi, Osonde A. Osoba | Published: 2020-10-04 | Updated: 2020-10-13

DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach

Authors: Salvatore Saeli, Federica Bisio, Pierangelo Lombardo, Danilo Massa | Published: 2020-10-04

Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets

Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04

Multi-Step Adversarial Perturbations on Recommender Systems Embeddings

Authors: Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra | Published: 2020-10-03