Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization

Authors: Seungyong Moon, Gaon An, Hyun Oh Song | Published: 2019-05-16 | Updated: 2022-10-18

Data Poisoning Attacks on Stochastic Bandits

Authors: Fang Liu, Ness Shroff | Published: 2019-05-16

On Norm-Agnostic Robustness of Adversarial Training

Authors: Bai Li, Changyou Chen, Wenlin Wang, Lawrence Carin | Published: 2019-05-15

Machine Learning-Based Delay-Aware UAV Detection and Operation Mode Identification over Encrypted Wi-Fi Traffic

Authors: Amir Alipour-Fanid, Monireh Dabaghchian, Ning Wang, Pu Wang, Liang Zhao, Kai Zeng | Published: 2019-05-15 | Updated: 2019-12-17

Automatic Malware Description via Attribute Tagging and Similarity Embedding

Authors: Felipe N. Ducau, Ethan M. Rudd, Tad M. Heppner, Alex Long, Konstantin Berlin | Published: 2019-05-15 | Updated: 2020-01-23

Multiple perspectives HMM-based feature engineering for credit card fraud detection

Authors: Yvan Lucas, Pierre-Edouard Portier, Léa Laporte, Olivier Caelen, Liyun He-Guelton, Sylvie Calabretto, Michael Granitzer | Published: 2019-05-15

Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection

Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16

Transferable Clean-Label Poisoning Attacks on Deep Neural Nets

Authors: Chen Zhu, W. Ronny Huang, Ali Shafahi, Hengduo Li, Gavin Taylor, Christoph Studer, Tom Goldstein | Published: 2019-05-15 | Updated: 2019-05-16

Network Attacks Anomaly Detection Using SNMP MIB Interface Parameters

Authors: Ghazi Al-Naymatm, Ahmed Hambouz, Mouhammd Alkasassbeh | Published: 2019-05-14 | Updated: 2019-10-19

Robustification of deep net classifiers by key based diversified aggregation with pre-filtering

Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-14