Feature Distillation With Guided Adversarial Contrastive Learning

Authors: Tao Bai, Jinnan Chen, Jun Zhao, Bihan Wen, Xudong Jiang, Alex Kot | Published: 2020-09-21

DeepDyve: Dynamic Verification for Deep Neural Networks

Authors: Yu Li, Min Li, Bo Luo, Ye Tian, Qiang Xu | Published: 2020-09-21 | Updated: 2020-10-16

Adversarial Training with Stochastic Weight Average

Authors: Joong-Won Hwang, Youngwan Lee, Sungchan Oh, Yuseok Bae | Published: 2020-09-21

Adversarial Concept Drift Detection under Poisoning Attacks for Robust Data Stream Mining

Authors: Łukasz Korycki, Bartosz Krawczyk | Published: 2020-09-20

Phishing Detection Using Machine Learning Techniques

Authors: Vahid Shahrivari, Mohammad Mahdi Darabi, Mohammad Izadi | Published: 2020-09-20

Early detection of the advanced persistent threat attack using performance analysis of deep learning

Authors: Javad Hassannataj Joloudari, Mojtaba Haderbadi, Amir Mashmool, Mohammad GhasemiGol, Shahab S., Amir Mosavi | Published: 2020-09-19

EI-MTD:Moving Target Defense for Edge Intelligence against Adversarial Attacks

Authors: Yaguan Qian, Qiqi Shao, Jiamin Wang, Xiang Lin, Yankai Guo, Zhaoquan Gu, Bin Wang, Chunming Wu | Published: 2020-09-19 | Updated: 2020-11-25

A Framework of Randomized Selection Based Certified Defenses Against Data Poisoning Attacks

Authors: Ruoxin Chen, Jie Li, Chentao Wu, Bin Sheng, Ping Li | Published: 2020-09-18 | Updated: 2020-10-13

Fine-tuning Is Not Enough: A Simple yet Effective Watermark Removal Attack for DNN Models

Authors: Shangwei Guo, Tianwei Zhang, Han Qiu, Yi Zeng, Tao Xiang, Yang Liu | Published: 2020-09-18 | Updated: 2021-05-17

On Primes, Log-Loss Scores and (No) Privacy

Authors: Abhinav Aggarwal, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-09-17