Tactics of Adversarial Attack on Deep Reinforcement Learning Agents

Authors: Yen-Chen Lin, Zhang-Wei Hong, Yuan-Hong Liao, Meng-Li Shih, Ming-Yu Liu, Min Sun | Published: 2017-03-08 | Updated: 2019-11-13

Generative Poisoning Attack Method Against Neural Networks

Authors: Chaofei Yang, Qing Wu, Hai Li, Yiran Chen | Published: 2017-03-03

Differentially Private Bayesian Learning on Distributed Data

Authors: Mikko Heikkilä, Eemil Lagerspetz, Samuel Kaski, Kana Shimizu, Sasu Tarkoma, Antti Honkela | Published: 2017-03-03 | Updated: 2017-05-29

LeakSemantic: Identifying Abnormal Sensitive Network Transmissions in Mobile Applications

Authors: Hao Fu, Zizhan Zheng, Somdutta Bose, Matt Bishop, Prasant Mohapatra | Published: 2017-02-03 | Updated: 2017-02-07

Reluplex: An Efficient SMT Solver for Verifying Deep Neural Networks

Authors: Guy Katz, Clark Barrett, David Dill, Kyle Julian, Mykel Kochenderfer | Published: 2017-02-03 | Updated: 2017-05-19

Beyond Free Riding: Quality of Indicators for Assessing Participation in Information Sharing for Threat Intelligence

Authors: Omar Al-Ibrahim, Aziz Mohaisen, Charles Kamhoua, Kevin Kwiat, Laurent Njilla | Published: 2017-02-02

Mining Anonymity: Identifying Sensitive Accounts on Twitter

Authors: Sai Teja Peddinti, Keith W. Ross, Justin Cappos | Published: 2017-02-01

Mobile phone identification through the built-in magnetometers

Authors: Gianmarco Baldini, Gary Steri, Raimondo Giuliani, Vladimir Kyovtorov | Published: 2017-01-26

Learn&Fuzz: Machine Learning for Input Fuzzing

Authors: Patrice Godefroid, Hila Peleg, Rishabh Singh | Published: 2017-01-25

Malicious URL Detection using Machine Learning: A Survey

Authors: Doyen Sahoo, Chenghao Liu, Steven C. H. Hoi | Published: 2017-01-25 | Updated: 2019-08-21