Hardening Random Forest Cyber Detectors Against Adversarial Attacks

Authors: Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti | Published: 2019-12-09

Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms

Authors: Guangxia Lia, Yulong Shena, Peilin Zhaob, Xiao Lu, Jia Liu, Yangyang Liu, Steven C. H. Hoi | Published: 2019-12-08

An Empirical Study on the Relation between Network Interpretability and Adversarial Robustness

Authors: Adam Noack, Isaac Ahern, Dejing Dou, Boyang Li | Published: 2019-12-07 | Updated: 2020-12-04

Principal Component Properties of Adversarial Samples

Authors: Malhar Jere, Sandro Herbig, Christine Lind, Farinaz Koushanfar | Published: 2019-12-07

An Empirical Study on the Intrinsic Privacy of SGD

Authors: Stephanie L. Hyland, Shruti Tople | Published: 2019-12-05 | Updated: 2022-02-28

Label-Consistent Backdoor Attacks

Authors: Alexander Turner, Dimitris Tsipras, Aleksander Madry | Published: 2019-12-05 | Updated: 2019-12-06

ASTRA: High Throughput 3PC over Rings with Application to Secure Prediction

Authors: Harsh Chaudhari, Ashish Choudhury, Arpita Patra, Ajith Suresh | Published: 2019-12-05

A Survey of Game Theoretic Approaches for Adversarial Machine Learning in Cybersecurity Tasks

Authors: Prithviraj Dasgupta, Joseph B. Collins | Published: 2019-12-04

A Survey of Black-Box Adversarial Attacks on Computer Vision Models

Authors: Siddhant Bhambri, Sumanyu Muku, Avinash Tulasi, Arun Balaji Buduru | Published: 2019-12-03 | Updated: 2020-02-07

FANNet: Formal Analysis of Noise Tolerance, Training Bias and Input Sensitivity in Neural Networks

Authors: Mahum Naseer, Mishal Fatima Minhas, Faiq Khalid, Muhammad Abdullah Hanif, Osman Hasan, Muhammad Shafique | Published: 2019-12-03 | Updated: 2020-05-14