Differentially Empirical Risk Minimization under the Fairness Lens

Authors: Cuong Tran, My H. Dinh, Ferdinando Fioretto | Published: 2021-06-04 | Updated: 2022-09-08

GRAVITAS: Graphical Reticulated Attack Vectors for Internet-of-Things Aggregate Security

Authors: Jacob Brown, Tanujay Saha, Niraj K. Jha | Published: 2021-05-31

Gradient-based Data Subversion Attack Against Binary Classifiers

Authors: Rosni K Vasu, Sanjay Seetharaman, Shubham Malaviya, Manish Shukla, Sachin Lodha | Published: 2021-05-31

Two Coupled Rejection Metrics Can Tell Adversarial Examples Apart

Authors: Tianyu Pang, Huishuai Zhang, Di He, Yinpeng Dong, Hang Su, Wei Chen, Jun Zhu, Tie-Yan Liu | Published: 2021-05-31 | Updated: 2022-03-31

Robustifying $\ell_\infty$ Adversarial Training to the Union of Perturbation Models

Authors: Ameya D. Patil, Michael Tuttle, Alexander G. Schwing, Naresh R. Shanbhag | Published: 2021-05-31 | Updated: 2021-06-11

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30

Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness

Authors: Glenn Dawson, Robi Polikar | Published: 2021-05-28 | Updated: 2021-06-05

DeepMoM: Robust Deep Learning With Median-of-Means

Authors: Shih-Ting Huang, Johannes Lederer | Published: 2021-05-28 | Updated: 2021-11-08

Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm

Authors: Fan Huang | Published: 2021-05-28

Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques

Authors: ElMouatez Billah Karbab, Mourad Debbabi | Published: 2021-05-27