Detection Defense Against Adversarial Attacks with Saliency Map

Authors: Dengpan Ye, Chuanxi Chen, Changrui Liu, Hao Wang, Shunzhi Jiang | Published: 2020-09-06

CLEANN: Accelerated Trojan Shield for Embedded Neural Networks

Authors: Mojan Javaheripi, Mohammad Samragh, Gregory Fields, Tara Javidi, Farinaz Koushanfar | Published: 2020-09-04

Model extraction from counterfactual explanations

Authors: Ulrich Aïvodji, Alexandre Bolot, Sébastien Gambs | Published: 2020-09-03

Cost-aware Feature Selection for IoT Device Classification

Authors: Biswadeep Chakraborty, Dinil Mon Divakaran, Ido Nevat, Gareth W. Peters, Mohan Gurusamy | Published: 2020-09-02 | Updated: 2021-04-21

Yet Meta Learning Can Adapt Fast, It Can Also Break Easily

Authors: Han Xu, Yaxin Li, Xiaorui Liu, Hui Liu, Jiliang Tang | Published: 2020-09-02

Adversarial Attacks on Deep Learning Systems for User Identification based on Motion Sensors

Authors: Cezara Benegui, Radu Tudor Ionescu | Published: 2020-09-02 | Updated: 2020-11-05

A Survey on Negative Transfer

Authors: Wen Zhang, Lingfei Deng, Lei Zhang, Dongrui Wu | Published: 2020-09-02 | Updated: 2021-08-09

Vulnerability-Aware Poisoning Mechanism for Online RL with Unknown Dynamics

Authors: Yanchao Sun, Da Huo, Furong Huang | Published: 2020-09-02 | Updated: 2022-02-15

Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey

Authors: Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan Debnath, Imtiaz Parvez, Arif Sarwat, Mohammad Ashiqur Rahman | Published: 2020-09-01

MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models

Authors: Thai Le, Suhang Wang, Dongwon Lee | Published: 2020-09-01 | Updated: 2020-09-27