Humpty Dumpty: Controlling Word Meanings via Corpus Poisoning

Authors: Roei Schuster, Tal Schuster, Yoav Meri, Vitaly Shmatikov | Published: 2020-01-14

DeepQuarantine for Suspicious Mail

Authors: Nikita Benkovich, Roman Dedenok, Dmitry Golubev | Published: 2020-01-13

Advbox: a toolbox to generate adversarial examples that fool neural networks

Authors: Dou Goodman, Hao Xin, Wang Yang, Wu Yuesheng, Xiong Junfeng, Zhang Huan | Published: 2020-01-13 | Updated: 2020-08-26

On the Resilience of Biometric Authentication Systems against Random Inputs

Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar | Published: 2020-01-13 | Updated: 2020-01-24

Membership Inference Attacks Against Object Detection Models

Authors: Yeachan Park, Myungjoo Kang | Published: 2020-01-12 | Updated: 2020-01-28

Fast is better than free: Revisiting adversarial training

Authors: Eric Wong, Leslie Rice, J. Zico Kolter | Published: 2020-01-12

Simulated Blockchains for Machine Learning Traceability and Transaction Values in the Monero Network

Authors: Nathan Borggren, Hyoung-yoon Kim, Lihan Yao, Gary Koplik | Published: 2020-01-12

Campfire: Compressible, Regularization-Free, Structured Sparse Training for Hardware Accelerators

Authors: Noah Gamboa, Kais Kudrolli, Anand Dhoot, Ardavan Pedram | Published: 2020-01-09 | Updated: 2020-01-13

Real-Time Edge Intelligence in the Making: A Collaborative Learning Framework via Federated Meta-Learning

Authors: Sen Lin, Guang Yang, Junshan Zhang | Published: 2020-01-09 | Updated: 2020-05-08

Secure multiparty computations in floating-point arithmetic

Authors: Chuan Guo, Awni Hannun, Brian Knott, Laurens van der Maaten, Mark Tygert, Ruiyu Zhu | Published: 2020-01-09