Local Differential Privacy for Deep Learning

Authors: M. A. P. Chamikara, P. Bertok, I. Khalil, D. Liu, S. Camtepe, M. Atiquzzaman | Published: 2019-08-08 | Updated: 2019-11-09

Investigating Decision Boundaries of Trained Neural Networks

Authors: Roozbeh Yousefzadeh, Dianne P O'Leary | Published: 2019-08-07

BlurNet: Defense by Filtering the Feature Maps

Authors: Ravi Raju, Mikko Lipasti | Published: 2019-08-06 | Updated: 2020-05-16

Model Agnostic Defence against Backdoor Attacks in Machine Learning

Authors: Sakshi Udeshi, Shanshan Peng, Gerald Woo, Lionell Loh, Louth Rawshan, Sudipta Chattopadhyay | Published: 2019-08-06 | Updated: 2022-03-31

A principled approach for generating adversarial images under non-smooth dissimilarity metrics

Authors: Aram-Alexandre Pooladian, Chris Finlay, Tim Hoheisel, Adam Oberman | Published: 2019-08-05 | Updated: 2019-10-08

A Restricted Black-box Adversarial Framework Towards Attacking Graph Embedding Models

Authors: Heng Chang, Yu Rong, Tingyang Xu, Wenbing Huang, Honglei Zhang, Peng Cui, Wenwu Zhu, Junzhou Huang | Published: 2019-08-04 | Updated: 2019-12-17

A systematic review of fuzzing based on machine learning techniques

Authors: Yan Wang, Peng Jia, Luping Liu, Jiayong Liu | Published: 2019-08-04

On the Veracity of Cyber Intrusion Alerts Synthesized by Generative Adversarial Networks

Authors: Christopher Sweet, Stephen Moskal, Shanchieh Jay Yang | Published: 2019-08-03

Exploring the Robustness of NMT Systems to Nonsensical Inputs

Authors: Akshay Chaturvedi, Abijith KP, Utpal Garain | Published: 2019-08-03 | Updated: 2020-02-28

Continuous-Variable Quantum Key Distribution with a Real Local Oscillator and without Auxiliary Signals

Authors: Sebastian Kleis, Max Rueckmann, Christian G. Schaeffer | Published: 2019-08-02