Face2Face: Real-time Face Capture and Reenactment of RGB Videos

Authors: Justus Thies, Michael Zollhöfer, Marc Stamminger, Christian Theobalt, Matthias Nießner | Published: 2020-07-29

Label-Only Membership Inference Attacks

Authors: Christopher A. Choquette-Choo, Florian Tramer, Nicholas Carlini, Nicolas Papernot | Published: 2020-07-28 | Updated: 2021-12-05

Tempered Sigmoid Activations for Deep Learning with Differential Privacy

Authors: Nicolas Papernot, Abhradeep Thakurta, Shuang Song, Steve Chien, Úlfar Erlingsson | Published: 2020-07-28

Reachable Sets of Classifiers and Regression Models: (Non-)Robustness Analysis and Robust Training

Authors: Anna-Kathrin Kopetzki, Stephan Günnemann | Published: 2020-07-28 | Updated: 2021-05-12

Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning

Authors: Jirong Yi, Raghu Mudumbai, Weiyu Xu | Published: 2020-07-28

Swipe dynamics as a means of authentication: results from a Bayesian unsupervised approach

Authors: Parker Lamb, Alexander Millar, Ramon Fuentes | Published: 2020-07-27 | Updated: 2020-10-13

EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection

Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby | Published: 2020-07-27 | Updated: 2020-10-15

Feature importance in mobile malware detection

Authors: Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng | Published: 2020-07-27 | Updated: 2020-08-28

Evaluation of Federated Learning in Phishing Email Detection

Authors: Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng | Published: 2020-07-27 | Updated: 2021-05-21

Detecting malicious PDF using CNN

Authors: Raphael Fettaya, Yishay Mansour | Published: 2020-07-24 | Updated: 2020-08-02