Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS

Authors: Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal | Published: 2020-02-15

Adversarial Distributional Training for Robust Deep Learning

Authors: Yinpeng Dong, Zhijie Deng, Tianyu Pang, Hang Su, Jun Zhu | Published: 2020-02-14 | Updated: 2020-11-19

Skip Connections Matter: On the Transferability of Adversarial Examples Generated with ResNets

Authors: Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey, Xingjun Ma | Published: 2020-02-14

Identifying Audio Adversarial Examples via Anomalous Pattern Detection

Authors: Victor Akinwande, Celia Cintas, Skyler Speakman, Srihari Sridharan | Published: 2020-02-13 | Updated: 2020-07-25

CEB Improves Model Robustness

Authors: Ian Fischer, Alexander A. Alemi | Published: 2020-02-13

Over-the-Air Adversarial Flickering Attacks against Video Recognition Networks

Authors: Roi Pony, Itay Naeh, Shie Mannor | Published: 2020-02-12 | Updated: 2021-06-04

Graph Universal Adversarial Attacks: A Few Bad Actors Ruin Graph Learning Models

Authors: Xiao Zang, Yi Xie, Jie Chen, Bo Yuan | Published: 2020-02-12 | Updated: 2021-06-23

More Data Can Expand the Generalization Gap Between Adversarially Robust and Standard Models

Authors: Lin Chen, Yifei Min, Mingrui Zhang, Amin Karbasi | Published: 2020-02-11 | Updated: 2020-08-15

Adversarial Robustness for Code

Authors: Pavol Bielik, Martin Vechev | Published: 2020-02-11 | Updated: 2020-08-15

Fundamental Tradeoffs between Invariance and Sensitivity to Adversarial Perturbations

Authors: Florian Tramèr, Jens Behrmann, Nicholas Carlini, Nicolas Papernot, Jörn-Henrik Jacobsen | Published: 2020-02-11 | Updated: 2020-08-04