A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps

Authors: Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li | Published: 2020-08-31

Imitation Privacy

Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30

Benchmarking adversarial attacks and defenses for time-series data

Authors: Shoaib Ahmed Siddiqui, Andreas Dengel, Sheraz Ahmed | Published: 2020-08-30

Adversarial Privacy Preserving Graph Embedding against Inference Attack

Authors: Kaiyang Li, Guangchun Luo, Yang Ye, Wei Li, Shihao Ji, Zhipeng Cai | Published: 2020-08-30

Improving Resistance to Adversarial Deformations by Regularizing Gradients

Authors: Pengfei Xia, Bin Li | Published: 2020-08-29 | Updated: 2020-10-06

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan | Published: 2020-08-28

Against Membership Inference Attack: Pruning is All You Need

Authors: Yijue Wang, Chenghong Wang, Zigeng Wang, Shanglin Zhou, Hang Liu, Jinbo Bi, Caiwen Ding, Sanguthevar Rajasekaran | Published: 2020-08-28 | Updated: 2021-07-04

Every Query Counts: Analyzing the Privacy Loss of Exploratory Data Analyses

Authors: Saskia Nuñez von Voigt, Mira Pauli, Johanna Reichert, Florian Tschorsch | Published: 2020-08-27

Adversarial Eigen Attack on Black-Box Models

Authors: Linjun Zhou, Peng Cui, Yinan Jiang, Shiqiang Yang | Published: 2020-08-27

Adversarially Training for Audio Classifiers

Authors: Raymel Alfonso Sallo, Mohammad Esmaeilpour, Patrick Cardinal | Published: 2020-08-26 | Updated: 2020-10-25