Detecting Adversarial Examples from Sensitivity Inconsistency of Spatial-Transform Domain

Authors: Jinyu Tian, Jiantao Zhou, Yuanman Li, Jia Duan | Published: 2021-03-07

T-Miner: A Generative Approach to Defend Against Trojan Attacks on DNN-based Text Classification

Authors: Ahmadreza Azizi, Ibrahim Asadullah Tahmid, Asim Waheed, Neal Mangaokar, Jiameng Pu, Mobin Javed, Chandan K. Reddy, Bimal Viswanath | Published: 2021-03-07 | Updated: 2021-03-11

Utilising Flow Aggregation to Classify Benign Imitating Attacks

Authors: Hanan Hindy, Robert Atkinson, Christos Tachtatzis, Ethan Bayne, Miroslav Bures, Xavier Bellekens | Published: 2021-03-06

MalBERT: Using Transformers for Cybersecurity and Malicious Software Detection

Authors: Abir Rahali, Moulay A. Akhloufi | Published: 2021-03-05

A Novel Framework for Threat Analysis of Machine Learning-based Smart Healthcare Systems

Authors: Nur Imtiazul Haque, Mohammad Ashiqur Rahman, Md Hasan Shahriar, Alvi Ataur Khalil, Selcuk Uluagac | Published: 2021-03-05

Efficient Encrypted Inference on Ensembles of Decision Trees

Authors: Kanthi Sarpatwar, Karthik Nandakumar, Nalini Ratha, James Rayfield, Karthikeyan Shanmugam, Sharath Pankanti, Roman Vaculin | Published: 2021-03-05

Quantifying identifiability to choose and audit $ε$ in differentially private deep learning

Authors: Daniel Bernau, Günther Eibl, Philip W. Grassal, Hannah Keller, Florian Kerschbaum | Published: 2021-03-04 | Updated: 2021-07-20

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

Authors: Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal | Published: 2021-03-03

A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models

Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-03-03 | Updated: 2021-07-07

Malware Classification with Word Embedding Features

Authors: Aparna Sunil Kale, Fabio Di Troia, Mark Stamp | Published: 2021-03-03