A Review of Machine Learning Applications in Fuzzing

Authors: Gary J Saavedra, Kathryn N Rodhouse, Daniel M Dunlavy, Philip W Kegelmeyer | Published: 2019-06-13 | Updated: 2019-10-09

Deep Reinforcement Learning for Cyber Security

Authors: Thanh Thi Nguyen, Vijay Janapa Reddi | Published: 2019-06-13 | Updated: 2021-11-02

Evolutionary Trigger Set Generation for DNN Black-Box Watermarking

Authors: Jia Guo, Miodrag Potkonjak | Published: 2019-06-11 | Updated: 2021-02-14

Topology Attack and Defense for Graph Neural Networks: An Optimization Perspective

Authors: Kaidi Xu, Hongge Chen, Sijia Liu, Pin-Yu Chen, Tsui-Wei Weng, Mingyi Hong, Xue Lin | Published: 2019-06-10 | Updated: 2019-10-14

Attacking Graph Convolutional Networks via Rewiring

Authors: Yao Ma, Suhang Wang, Tyler Derr, Lingfei Wu, Jiliang Tang | Published: 2019-06-10 | Updated: 2019-09-28

Provably Robust Deep Learning via Adversarially Trained Smoothed Classifiers

Authors: Hadi Salman, Greg Yang, Jerry Li, Pengchuan Zhang, Huan Zhang, Ilya Razenshteyn, Sebastien Bubeck | Published: 2019-06-09 | Updated: 2020-01-10

Adversarial Attack Generation Empowered by Min-Max Optimization

Authors: Jingkang Wang, Tianyun Zhang, Sijia Liu, Pin-Yu Chen, Jiacen Xu, Makan Fardad, Bo Li | Published: 2019-06-09 | Updated: 2021-11-01

Real or Fake? Learning to Discriminate Machine from Human Generated Text

Authors: Anton Bakhtin, Sam Gross, Myle Ott, Yuntian Deng, Marc'Aurelio Ranzato, Arthur Szlam | Published: 2019-06-07 | Updated: 2019-11-25

Robustness for Non-Parametric Classification: A Generic Attack and Defense

Authors: Yao-Yuan Yang, Cyrus Rashtchian, Yizhen Wang, Kamalika Chaudhuri | Published: 2019-06-07 | Updated: 2020-02-24

A cryptographic approach to black box adversarial machine learning

Authors: Kevin Shi, Daniel Hsu, Allison Bishop | Published: 2019-06-07 | Updated: 2020-02-21