Road Context-aware Intrusion Detection System for Autonomous Cars

Authors: Jingxuan Jiang, Chundong Wang, Sudipta Chattopadhyay, Wei Zhang | Published: 2019-08-02

Black-box Adversarial ML Attack on Modulation Classification

Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-08-01

KiloGrams: Very Large N-Grams for Malware Classification

Authors: Edward Raff, William Fleming, Richard Zak, Hyrum Anderson, Bill Finlayson, Charles Nicholas, Mark McLean | Published: 2019-08-01

Learning-Aided Physical Layer Attacks Against Multicarrier Communications in IoT

Authors: Alireza Nooraiepour, Waheed U. Bajwa, Narayan B. Mandayam | Published: 2019-08-01 | Updated: 2020-07-04

Optimal Attacks on Reinforcement Learning Policies

Authors: Alessio Russo, Alexandre Proutiere | Published: 2019-07-31

Time Series Analysis of Big Data for Electricity Price and Demand to Find Cyber-Attacks part 2: Decomposition Analysis

Authors: Mohsen Rakhshandehroo, Mohammad Rajabdorri | Published: 2019-07-30

Privacy-preserving Distributed Machine Learning via Local Randomization and ADMM Perturbation

Authors: Xin Wang, Hideaki Ishii, Linkang Du, Peng Cheng, Jiming Chen | Published: 2019-07-30 | Updated: 2019-09-09

Impact of Adversarial Examples on Deep Learning Models for Biomedical Image Segmentation

Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30

Not All Adversarial Examples Require a Complex Defense: Identifying Over-optimized Adversarial Examples with IQR-based Logit Thresholding

Authors: Utku Ozbulak, Arnout Van Messem, Wesley De Neve | Published: 2019-07-30

Nonconvex Zeroth-Order Stochastic ADMM Methods with Lower Function Query Complexity

Authors: Feihu Huang, Shangqian Gao, Jian Pei, Heng Huang | Published: 2019-07-30 | Updated: 2023-12-11