Fingerprinting the Fingerprinters: Learning to Detect Browser Fingerprinting Behaviors

Authors: Umar Iqbal, Steven Englehardt, Zubair Shafiq | Published: 2020-08-11

An Automated, End-to-End Framework for Modeling Attacks From Vulnerability Descriptions

Authors: Hodaya Binyamini, Ron Bitton, Masaki Inokuchi, Tomohiko Yagyu, Yuval Elovici, Asaf Shabtai | Published: 2020-08-10

Scalable and Communication-efficient Decentralized Federated Edge Learning with Multi-blockchain Framework

Authors: Jiawen Kang, Zehui Xiong, Chunxiao Jiang, Yi Liu, Song Guo, Yang Zhang, Dusit Niyato, Cyril Leung, Chunyan Miao | Published: 2020-08-10

Local Differential Privacy and Its Applications: A Comprehensive Survey

Authors: Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam | Published: 2020-08-09

Multi-Stage Optimized Machine Learning Framework for Network Intrusion Detection

Authors: MohammadNoor Injadat, Abdallah Moubayed, Ali Bou Nassif, Abdallah Shami | Published: 2020-08-09

A Survey on Device Behavior Fingerprinting: Data Sources, Techniques, Application Scenarios, and Datasets

Authors: Pedro Miguel Sánchez Sánchez, Jose María Jorquera Valero, Alberto Huertas Celdrán, Gérôme Bovet, Manuel Gil Pérez, Gregorio Martínez Pérez | Published: 2020-08-07 | Updated: 2021-03-03

Investigating maximum likelihood based training of infinite mixtures for uncertainty quantification

Authors: Sina Däubener, Asja Fischer | Published: 2020-08-07 | Updated: 2020-08-17

Optimizing Information Loss Towards Robust Neural Networks

Authors: Philip Sperl, Konstantin Böttinger | Published: 2020-08-07 | Updated: 2020-09-29

Deep Active Learning with Crowdsourcing Data for Privacy Policy Classification

Authors: Wenjun Qiu, David Lie | Published: 2020-08-07

Stronger and Faster Wasserstein Adversarial Attacks

Authors: Kaiwen Wu, Allen Houze Wang, Yaoliang Yu | Published: 2020-08-06