Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

Authors: Inderjeet Singh, Toshinori Araki, Kazuya Kakizaki | Published: 2022-03-23

Ethereum Fraud Detection with Heterogeneous Graph Neural Networks

Authors: Hiroki Kanezashi, Toyotaro Suzumura, Xin Liu, Takahiro Hirofuchi | Published: 2022-03-23 | Updated: 2022-07-04

Online Encrypted Skype Identification Based on an Updating Mechanism

Authors: Shi Dong | Published: 2022-03-23

Semi-Targeted Model Poisoning Attack on Federated Learning via Backward Error Analysis

Authors: Yuwei Sun, Hideya Ochiai, Jun Sakuma | Published: 2022-03-22 | Updated: 2022-05-10

Dazzle: Using Optimized Generative Adversarial Networks to Address Security Data Class Imbalance Issue

Authors: Rui Shu, Tianpei Xia, Laurie Williams, Tim Menzies | Published: 2022-03-22 | Updated: 2022-05-02

FGAN: Federated Generative Adversarial Networks for Anomaly Detection in Network Traffic

Authors: Sankha Das | Published: 2022-03-21

Ovid: A Machine Learning Approach for Automated Vandalism Detection in OpenStreetMap

Authors: Nicolas Tempelmeier, Elena Demidova | Published: 2022-03-21

RareGAN: Generating Samples for Rare Classes

Authors: Zinan Lin, Hao Liang, Giulia Fanti, Vyas Sekar | Published: 2022-03-20

The Dark Side: Security Concerns in Machine Learning for EDA

Authors: Zhiyao Xie, Jingyu Pan, Chen-Chia Chang, Yiran Chen | Published: 2022-03-20

On Robust Prefix-Tuning for Text Classification

Authors: Zonghan Yang, Yang Liu | Published: 2022-03-19