Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests

Authors: Sean Kulinski, Saurabh Bagchi, David I. Inouye | Published: 2021-07-14

OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning

Authors: Jiacheng Liang, Songze Li, Bochuan Cao, Wensi Jiang, Chaoyang He | Published: 2021-07-12 | Updated: 2021-11-15

Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks

Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed | Published: 2021-07-12

Stateful Detection of Model Extraction Attacks

Authors: Soham Pal, Yash Gupta, Aditya Kanade, Shirish Shevade | Published: 2021-07-12

Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning

Authors: Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur | Published: 2021-07-11

Adversarial for Good? How the Adversarial ML Community’s Values Impede Socially Beneficial Uses of Attacks

Authors: Kendra Albert, Maggie Delano, Bogdan Kulynych, Ram Shankar Siva Kumar | Published: 2021-07-11 | Updated: 2021-09-15

Hack The Box: Fooling Deep Learning Abstraction-Based Monitors

Authors: Sara Hajj Ibrahim, Mohamed Nassar | Published: 2021-07-10 | Updated: 2021-07-18

Fedlearn-Algo: A flexible open-source privacy-preserving machine learning platform

Authors: Bo Liu, Chaowei Tan, Jiazhou Wang, Tao Zeng, Huasong Shan, Houpu Yao, Heng Huang, Peng Dai, Liefeng Bo, Yanqing Chen | Published: 2021-07-08 | Updated: 2021-07-30

Malware Classification Using Deep Boosted Learning

Authors: Muhammad Asam, Saddam Hussain Khan, Tauseef Jamal, Umme Zahoora, Asifullah Khan | Published: 2021-07-08

Analytically Tractable Hidden-States Inference in Bayesian Neural Networks

Authors: Luong-Ha Nguyen, James-A. Goulet | Published: 2021-07-08