Deep Learning for Insider Threat Detection: Review, Challenges and Opportunities

Authors: Shuhan Yuan, Xintao Wu | Published: 2020-05-25

Keyed Non-Parametric Hypothesis Tests

Authors: Yao Cheng, Cheng-Kang Chu, Hsiao-Ying Lin, Marius Lombard-Platet, David Naccache | Published: 2020-05-25

Adversarial Feature Selection against Evasion Attacks

Authors: Fei Zhang, Patrick P. K. Chan, Battista Biggio, Daniel S. Yeung, Fabio Roli | Published: 2020-05-25

Malware Detection at the Microarchitecture Level using Machine Learning Techniques

Authors: Abigail Kwan | Published: 2020-05-25

Detecting Adversarial Examples for Speech Recognition via Uncertainty Quantification

Authors: Sina Däubener, Lea Schönherr, Asja Fischer, Dorothea Kolossa | Published: 2020-05-24 | Updated: 2020-08-02

Adversarial Attack on Hierarchical Graph Pooling Neural Networks

Authors: Haoteng Tang, Guixiang Ma, Yurong Chen, Lei Guo, Wei Wang, Bo Zeng, Liang Zhan | Published: 2020-05-23

TIPRDC: Task-Independent Privacy-Respecting Data Crowdsourcing Framework for Deep Learning with Anonymized Intermediate Representations

Authors: Ang Li, Yixiao Duan, Huanrui Yang, Yiran Chen, Jianlei Yang | Published: 2020-05-23 | Updated: 2020-08-25

Retrieval-Augmented Generation for Knowledge-Intensive NLP Tasks

Authors: Patrick Lewis, Ethan Perez, Aleksandra Piktus, Fabio Petroni, Vladimir Karpukhin, Naman Goyal, Heinrich Küttler, Mike Lewis, Wen-tau Yih, Tim Rocktäschel, Sebastian Riedel, Douwe Kiela | Published: 2020-05-22 | Updated: 2021-04-12

An Adversarial Approach for Explaining the Predictions of Deep Neural Networks

Authors: Arash Rahnama, Andrew Tseng | Published: 2020-05-20 | Updated: 2020-09-28

Graph Structure Learning for Robust Graph Neural Networks

Authors: Wei Jin, Yao Ma, Xiaorui Liu, Xianfeng Tang, Suhang Wang, Jiliang Tang | Published: 2020-05-20 | Updated: 2020-06-27