Detecting Adversarial Examples Is (Nearly) As Hard As Classifying Them

Authors: Florian Tramèr | Published: 2021-07-24 | Updated: 2022-06-16

Dynamic detection of mobile malware using smartphone data and machine learning

Authors: J. S. Panman de Wit, J. van der Ham, D. Bucur | Published: 2021-07-23

Membership Inference Attack and Defense for Wireless Signal Classifiers with Deep Learning

Authors: Yi Shi, Yalin E. Sagduyu | Published: 2021-07-22

Unsupervised Detection of Adversarial Examples with Model Explanations

Authors: Gihyuk Ko, Gyumin Lim | Published: 2021-07-22

Generative Models for Security: Attacks, Defenses, and Opportunities

Authors: Luke A. Bauer, Vincent Bindschaedler | Published: 2021-07-21 | Updated: 2021-07-29

Secure Random Sampling in Differential Privacy

Authors: Naoise Holohan, Stefano Braghin | Published: 2021-07-21 | Updated: 2021-11-24

On the Convergence of Prior-Guided Zeroth-Order Optimization Algorithms

Authors: Shuyu Cheng, Guoqiang Wu, Jun Zhu | Published: 2021-07-21 | Updated: 2021-11-07

Transfer Learning for Credit Card Fraud Detection: A Journey from Research to Production

Authors: Wissam Siblini, Guillaume Coter, Rémy Fabry, Liyun He-Guelton, Frédéric Oblé, Bertrand Lebichot, Yann-Aël Le Borgne, Gianluca Bontempi | Published: 2021-07-20 | Updated: 2021-11-04

Machine Learning Enhanced Blockchain Consensus with Transaction Prioritization for Smart Cities

Authors: S. Valli Sanghami, John J. Lee, Qin Hu | Published: 2021-07-20

MEGEX: Data-Free Model Extraction Attack against Gradient-Based Explainable AI

Authors: Takayuki Miura, Satoshi Hasegawa, Toshiki Shibahara | Published: 2021-07-19