Generalized Insider Attack Detection Implementation using NetFlow Data

Authors: Yash Samtani, Jesse Elwell | Published: 2020-10-27

FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries

Authors: Seng Pei Liew, Tsubasa Takahashi | Published: 2020-10-27

Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes

Authors: Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-10-26

Asymptotic Behavior of Adversarial Training in Binary Classification

Authors: Hossein Taheri, Ramtin Pedarsani, Christos Thrampoulidis | Published: 2020-10-26 | Updated: 2021-07-14

Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments

Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert | Published: 2020-10-25

ATRO: Adversarial Training with a Rejection Option

Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24

Graph Information Bottleneck

Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24

Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization

Authors: Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan | Published: 2020-10-24 | Updated: 2021-11-30

Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning

Authors: ibrahim Yilmaz, Ambareen Siraj | Published: 2020-10-23

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23