Trustable and Automated Machine Learning Running with Blockchain and Its Applications

Authors: Tao Wang, Xinmin Wu, Taiping He | Published: 2019-08-14

On Defending Against Label Flipping Attacks on Malware Detection Systems

Authors: Rahim Taheri, Reza Javidan, Mohammad Shojafar, Zahra Pooranian, Ali Miri, Mauro Conti | Published: 2019-08-13 | Updated: 2020-06-16

Automatic Model Monitoring for Data Streams

Authors: Fábio Pinto, Marco O. P. Sampaio, Pedro Bizarro | Published: 2019-08-12

nGraph-HE2: A High-Throughput Framework for Neural Network Inference on Encrypted Data

Authors: Fabian Boemer, Anamaria Costache, Rosario Cammarota, Casimir Wierzynski | Published: 2019-08-12 | Updated: 2019-08-29

Instance Enhancement Batch Normalization: an Adaptive Regulator of Batch Noise

Authors: Senwei Liang, Zhongzhan Huang, Mingfu Liang, Haizhao Yang | Published: 2019-08-12 | Updated: 2019-09-18

Catching the Phish: Detecting Phishing Attacks using Recurrent Neural Networks (RNNs)

Authors: Lukas Halgas, Ioannis Agrafiotis, Jason R. C. Nurse | Published: 2019-08-09

On the Adversarial Robustness of Neural Networks without Weight Transport

Authors: Mohamed Akrout | Published: 2019-08-09 | Updated: 2019-10-03

Februus: Input Purification Defense Against Trojan Attacks on Deep Neural Network Systems

Authors: Bao Gia Doan, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2019-08-09 | Updated: 2020-09-28

Defending Against Adversarial Iris Examples Using Wavelet Decomposition

Authors: Sobhan Soleymani, Ali Dabouei, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2019-08-08

Universal Adversarial Audio Perturbations

Authors: Sajjad Abdoli, Luiz G. Hafemann, Jerome Rony, Ismail Ben Ayed, Patrick Cardinal, Alessandro L. Koerich | Published: 2019-08-08 | Updated: 2020-11-17