Protecting the integrity of the training procedure of neural networks

Authors: Christian Berghoff | Published: 2020-05-14

Ethical Adversaries: Towards Mitigating Unfairness with Adversarial Machine Learning

Authors: Pieter Delobelle, Paul Temple, Gilles Perrouin, Benoît Frénay, Patrick Heymans, Bettina Berendt | Published: 2020-05-14 | Updated: 2020-09-01

Data Augmentation for Deep Candlestick Learner

Authors: Chia-Ying Tsao, Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai | Published: 2020-05-14 | Updated: 2020-05-29

Prive-HD: Privacy-Preserved Hyperdimensional Computing

Authors: Behnam Khaleghi, Mohsen Imani, Tajana Rosing | Published: 2020-05-14

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

Authors: Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan | Published: 2020-05-13

DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses

Authors: Yaxin Li, Wei Jin, Han Xu, Jiliang Tang | Published: 2020-05-13

Android Malware Clustering using Community Detection on Android Packages Similarity Network

Authors: ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb | Published: 2020-05-12

Towards Memory Safe Python Enclave for Security Sensitive Computation

Authors: Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding | Published: 2020-05-12

Perturbing Inputs to Prevent Model Stealing

Authors: Justin Grana | Published: 2020-05-12

A Secure Federated Learning Framework for 5G Networks

Authors: Yi Liu, Jialiang Peng, Jiawen Kang, Abdullah M. Iliyasu, Dusit Niyato, Ahmed A. Abd El-Latif | Published: 2020-05-12