Automated email Generation for Targeted Attacks using Natural Language

Authors: Avisha Das, Rakesh Verma | Published: 2019-08-19

Verification of Neural Network Control Policy Under Persistent Adversarial Perturbation

Authors: Yuh-Shyang Wang, Tsui-Wei Weng, Luca Daniel | Published: 2019-08-18

Nesterov Accelerated Gradient and Scale Invariance for Adversarial Attacks

Authors: Jiadong Lin, Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2019-08-17 | Updated: 2020-02-03

On the Adversarial Robustness of Subspace Learning

Authors: Fuwei Li, Lifeng Lai, Shuguang Cui | Published: 2019-08-17

Adversarial shape perturbations on 3D point clouds

Authors: Daniel Liu, Ronald Yu, Hao Su | Published: 2019-08-16 | Updated: 2020-10-23

The Next 700 Policy Miners: A Universal Method for Building Policy Miners

Authors: Carlos Cotrini, Luca Corinzia, Thilo Weghorn, David Basin | Published: 2019-08-16 | Updated: 2019-08-27

FSGAN: Subject Agnostic Face Swapping and Reenactment

Authors: Yuval Nirkin, Yosi Keller, Tal Hassner | Published: 2019-08-16

Towards usable automated detection of CPU architecture and endianness for arbitrary binary files and object code sequences

Authors: Sami Kairajärvi, Andrei Costin, Timo Hämäläinen | Published: 2019-08-15

Side-Channel Aware Fuzzing

Authors: Philip Sperl, Konstantin Böttinger | Published: 2019-08-14

Interpretable Encrypted Searchable Neural Networks

Authors: Kai Chen, Zhongrui Lin, Jian Wan, Chungen Xu | Published: 2019-08-14