Deep-Lock: Secure Authorization for Deep Neural Networks

Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18

Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis

Authors: Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu | Published: 2020-08-13

Detecting Abnormal Traffic in Large-Scale Networks

Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2020-08-13

WAFFLe: Weight Anonymized Factorization for Federated Learning

Authors: Weituo Hao, Nikhil Mehta, Kevin J Liang, Pengyu Cheng, Mostafa El-Khamy, Lawrence Carin | Published: 2020-08-13

Learning to Learn from Mistakes: Robust Optimization for Adversarial Noise

Authors: Alex Serban, Erik Poll, Joost Visser | Published: 2020-08-12

Revisiting Adversarially Learned Injection Attacks Against Recommender Systems

Authors: Jiaxi Tang, Hongyi Wen, Ke Wang | Published: 2020-08-11 | Updated: 2020-08-28

ProblemChild: Discovering Anomalous Patterns based on Parent-Child Process Relationships

Authors: Bobby Filar, David French | Published: 2020-08-11

Network Intrusion Detection Using Wrapper-based Decision Tree for Feature Selection

Authors: Mubarak Albarka Umar, Chen Zhanfang, Yan Liu | Published: 2020-08-11

Towards Plausible Differentially Private ADMM Based Distributed Machine Learning

Authors: Jiahao Ding, Jingyi Wang, Guannan Liang, Jinbo Bi, Miao Pan | Published: 2020-08-11

Intrinsic Certified Robustness of Bagging against Data Poisoning Attacks

Authors: Jinyuan Jia, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-08-11 | Updated: 2020-12-09