Can’t Boil This Frog: Robustness of Online-Trained Autoencoder-Based Anomaly Detectors to Adversarial Poisoning Attacks

Authors: Moshe Kravchik, Asaf Shabtai | Published: 2020-02-07

Equivalence relations and $L^p$ distances between time series with application to the Black Summer Australian bushfires

Authors: Nick James, Max Menzies | Published: 2020-02-07 | Updated: 2023-02-28

Over-the-Air Adversarial Attacks on Deep Learning Based Modulation Classifier over Wireless Channels

Authors: Brian Kim, Yalin E. Sagduyu, Kemal Davaslioglu, Tugba Erpek, Sennur Ulukus | Published: 2020-02-05 | Updated: 2020-02-13

Understanding the Decision Boundary of Deep Neural Networks: An Empirical Study

Authors: David Mickisch, Felix Assion, Florens Greßner, Wiebke Günther, Mariele Motta | Published: 2020-02-05

Knowledge Federation: A Unified and Hierarchical Privacy-Preserving AI Framework

Authors: Hongyu Li, Dan Meng, Hong Wang, Xiaolin Li | Published: 2020-02-05 | Updated: 2020-05-22

Minimax Defense against Gradient-based Adversarial Attacks

Authors: Blerta Lindqvist, Rauf Izmailov | Published: 2020-02-04

Adversarial Machine Learning — Industry Perspectives

Authors: Ram Shankar Siva Kumar, Magnus Nyström, John Lambert, Andrew Marshall, Mario Goertzel, Andi Comissoneru, Matt Swann, Sharon Xia | Published: 2020-02-04 | Updated: 2021-03-19

Defending Adversarial Attacks via Semantic Feature Manipulation

Authors: Shuo Wang, Tianle Chen, Surya Nepal, Carsten Rudolph, Marthie Grobler, Shangyu Chen | Published: 2020-02-03 | Updated: 2020-04-22

Learning to Detect Malicious Clients for Robust Federated Learning

Authors: Suyi Li, Yong Cheng, Wei Wang, Yang Liu, Tianjian Chen | Published: 2020-02-01

Politics of Adversarial Machine Learning

Authors: Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar | Published: 2020-02-01 | Updated: 2020-04-26