Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor

Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren | Published: 2019-05-12

ECG Identification under Exercise and Rest Situations via Various Learning Methods

Authors: Zihan Wang, Yaoguang Li, Wei Cui | Published: 2019-05-11

Interpreting and Evaluating Neural Network Robustness

Authors: Fuxun Yu, Zhuwei Qin, Chenchen Liu, Liang Zhao, Yanzhi Wang, Xiang Chen | Published: 2019-05-10

On the Connection Between Adversarial Robustness and Saliency Map Interpretability

Authors: Christian Etmann, Sebastian Lunz, Peter Maass, Carola-Bibiane Schönlieb | Published: 2019-05-10

Adversarial Defense Framework for Graph Neural Network

Authors: Shen Wang, Zhengzhang Chen, Jingchao Ni, Xiao Yu, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-05-09 | Updated: 2019-05-10

Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack

Authors: Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li | Published: 2019-05-09

Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems

Authors: Kazuya Kakizaki, Kosuke Yoshida | Published: 2019-05-09 | Updated: 2020-01-28

Reconstruction of Privacy-Sensitive Data from Protected Templates

Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-08

Adaptive Generation of Unrestricted Adversarial Inputs

Authors: Isaac Dunn, Hadrien Pouget, Tom Melham, Daniel Kroening | Published: 2019-05-07 | Updated: 2019-10-01

Machine Learning Cryptanalysis of a Quantum Random Number Generator

Authors: Nhan Duy Truong, Jing Yan Haw, Syed Muhamad Assad, Ping Koy Lam, Omid Kavehei | Published: 2019-05-07 | Updated: 2019-05-13