A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries

Authors: Prithviraj Dasgupta, Zachariah Osman | Published: 2021-11-22

NTD: Non-Transferability Enabled Backdoor Detection

Authors: Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott | Published: 2021-11-22

Evaluating Adversarial Attacks on ImageNet: A Reality Check on Misclassification Classes

Authors: Utku Ozbulak, Maura Pintor, Arnout Van Messem, Wesley De Neve | Published: 2021-11-22

Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Model

Authors: Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai | Published: 2021-11-21 | Updated: 2022-09-07

Understanding Training-Data Leakage from Gradients in Neural Networks for Image Classification

Authors: Cangxiong Chen, Neill D. F. Campbell | Published: 2021-11-19

Fooling Adversarial Training with Inducing Noise

Authors: Zhirui Wang, Yifei Wang, Yisen Wang | Published: 2021-11-19

A Review of Adversarial Attack and Defense for Classification Methods

Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-11-18

Enhanced Membership Inference Attacks against Machine Learning Models

Authors: Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri | Published: 2021-11-18 | Updated: 2022-09-13

Enhancing the Insertion of NOP Instructions to Obfuscate Malware via Deep Reinforcement Learning

Authors: Daniel Gibert, Matt Fredrikson, Carles Mateu, Jordi Planes, Quan Le | Published: 2021-11-18

InspectJS: Leveraging Code Similarity and User-Feedback for Effective Taint Specification Inference for JavaScript

Authors: Saikat Dutta, Diego Garbervetsky, Shuvendu Lahiri, Max Schäfer | Published: 2021-11-18