Network entity characterization and attack prediction

Authors: Vaclav Bartos, Martin Zadnik, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis | Published: 2019-09-17

They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization

Authors: Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan | Published: 2019-09-16

Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication

Authors: Linda Senigagliesi, Marco Baldi, Ennio Gambi | Published: 2019-09-16

A Convolutional Transformation Network for Malware Classification

Authors: Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, Phu H. Phung | Published: 2019-09-16

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service

Authors: Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du | Published: 2019-09-16

Node Injection Attacks on Graphs via Reinforcement Learning

Authors: Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, Vasant Honavar | Published: 2019-09-14

White-Box Adversarial Defense via Self-Supervised Data Estimation

Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13

Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix

Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13

On the Hardness of Robust Classification

Authors: Pascale Gourdeau, Varun Kanade, Marta Kwiatkowska, James Worrell | Published: 2019-09-12

Machine Learning in/for Blockchain: Future and Challenges

Authors: Fang Chen, Hong Wan, Hua Cai, Guang Cheng | Published: 2019-09-12 | Updated: 2020-12-08