CAPTIVE: Constrained Adversarial Perturbations to Thwart IC Reverse Engineering

Authors: Amir Hosein Afandizadeh Zargari, Marzieh AshrafiAmiri, Minjun Seo, Sai Manoj Pudukotai Dinakarrao, Mohammed E. Fouda, Fadi Kurdahi | Published: 2021-10-21

Privacy in Open Search: A Review of Challenges and Solutions

Authors: Samuel Sousa, Christian Guetl, Roman Kern | Published: 2021-10-20 | Updated: 2022-04-04

Color Teams for Machine Learning Development

Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-10-20

Detecting and Identifying Optical Signal Attacks on Autonomous Driving Systems

Authors: Jindi Zhang, Yifan Zhang, Kejie Lu, Jianping Wang, Kui Wu, Xiaohua Jia, Bin Liu | Published: 2021-10-20

Multi-concept adversarial attacks

Authors: Vibha Belavadi, Yan Zhou, Murat Kantarcioglu, Bhavani M. Thuraisingham | Published: 2021-10-19

A ground-truth dataset of real security patches

Authors: Sofia Reis, Rui Abreu | Published: 2021-10-18

Poisoning Attacks on Fair Machine Learning

Authors: Minh-Hao Van, Wei Du, Xintao Wu, Aidong Lu | Published: 2021-10-17

Adversarial Attacks on Gaussian Process Bandits

Authors: Eric Han, Jonathan Scarlett | Published: 2021-10-16 | Updated: 2022-06-16

Mitigating Membership Inference Attacks by Self-Distillation Through a Novel Ensemble Architecture

Authors: Xinyu Tang, Saeed Mahloujifar, Liwei Song, Virat Shejwalkar, Milad Nasr, Amir Houmansadr, Prateek Mittal | Published: 2021-10-15

Adversarial Attacks on ML Defense Models Competition

Authors: Yinpeng Dong, Qi-An Fu, Xiao Yang, Wenzhao Xiang, Tianyu Pang, Hang Su, Jun Zhu, Jiayu Tang, Yuefeng Chen, XiaoFeng Mao, Yuan He, Hui Xue, Chao Li, Ye Liu, Qilong Zhang, Lianli Gao, Yunrui Yu, Xitong Gao, Zhe Zhao, Daquan Lin, Jiadong Lin, Chuanbiao Song, Zihao Wang, Zhennan Wu, Yang Guo, Jiequan Cui, Xiaogang Xu, Pengguang Chen | Published: 2021-10-15