Machine Learning Technology

Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24
Exploratory Attack
Adversarial Perturbation Techniques
Machine Learning Technology

Explaining Black-box Android Malware Detection

Authors: Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2018-03-09 | Updated: 2018-10-29
Machine Learning Technology
Feature Importance Analysis
Static Malware Detection

Stochastic Activation Pruning for Robust Adversarial Defense

Authors: Guneet S. Dhillon, Kamyar Azizzadenesheli, Zachary C. Lipton, Jeremy Bernstein, Jean Kossaifi, Aran Khanna, Anima Anandkumar | Published: 2018-03-05
Adversarial Example Detection
Adversarial Learning
Machine Learning Technology

Label Sanitization against Label Flipping Poisoning Attacks

Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02
Adversarial Attack Analysis
Machine Learning Technology
Detection of Poisonous Data

Online Feature Ranking for Intrusion Detection Systems

Authors: Buse Gul Atli, Alexander Jung | Published: 2018-03-01 | Updated: 2018-06-15
ML-Based IDS
Data Collection Method
Machine Learning Technology

Trustless Machine Learning Contracts; Evaluating and Exchanging Machine Learning Models on the Ethereum Blockchain

Authors: A. Besir Kurtulmus, Kenny Daniel | Published: 2018-02-27
Data Collection
Model evaluation methods
Machine Learning Technology

Generalized Byzantine-tolerant SGD

Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-02-27 | Updated: 2018-03-23
Robust Estimation
Adversarial Attack Analysis
Machine Learning Technology

On the Suitability of $L_p$-norms for Creating and Preventing Adversarial Examples

Authors: Mahmood Sharif, Lujo Bauer, Michael K. Reiter | Published: 2018-02-27 | Updated: 2018-07-27
Adversarial Example Detection
Adversarial Attack Analysis
Machine Learning Technology

Yedrouj-Net: An efficient CNN for spatial steganalysis

Authors: Mehdi Yedroudj, Frederic Comby, Marc Chaumont | Published: 2018-02-26
Privacy Design Principles
Machine Learning Technology
Research Methodology

IoT Security Techniques Based on Machine Learning

Authors: Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu | Published: 2018-01-19
IoT Security
Reinforcement Learning Method
Machine Learning Technology