Neural Network Laundering: Removing Black-Box Backdoor Watermarks from Deep Neural Networks

Authors: William Aiken, Hyoungshick Kim, Simon Woo | Published: 2020-04-22

Discovering Imperfectly Observable Adversarial Actions using Anomaly Detection

Authors: Olga Petrova, Karel Durkota, Galina Alperovich, Karel Horak, Michal Najman, Branislav Bosansky, Viliam Lisy | Published: 2020-04-22

Provably robust deep generative models

Authors: Filipe Condessa, Zico Kolter | Published: 2020-04-22

A Framework for Evaluating Gradient Leakage Attacks in Federated Learning

Authors: Wenqi Wei, Ling Liu, Margaret Loper, Ka-Ho Chow, Mehmet Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2020-04-22 | Updated: 2020-04-23

Probabilistic Safety for Bayesian Neural Networks

Authors: Matthew Wicker, Luca Laurenti, Andrea Patane, Marta Kwiatkowska | Published: 2020-04-21 | Updated: 2020-06-19

Certifying Joint Adversarial Robustness for Model Ensembles

Authors: Mainuddin Ahmad Jonas, David Evans | Published: 2020-04-21

EMPIR: Ensembles of Mixed Precision Deep Networks for Increased Robustness against Adversarial Attacks

Authors: Sanchari Sen, Balaraman Ravindran, Anand Raghunathan | Published: 2020-04-21

PhishOut: Effective Phishing Detection Using Selected Features

Authors: Suhail Paliath, Mohammad Abu Qbeitah, Monther Aldwairi | Published: 2020-04-21

Scalable and Secure Architecture for Distributed IoT Systems

Authors: Najmeddine Dhieb, Hakim Ghazzai, Hichem Besbes, Yehia Massoud | Published: 2020-04-20

Headless Horseman: Adversarial Attacks on Transfer Learning Models

Authors: Ahmed Abdelkader, Michael J. Curry, Liam Fowl, Tom Goldstein, Avi Schwarzschild, Manli Shu, Christoph Studer, Chen Zhu | Published: 2020-04-20