Mental Models of Adversarial Machine Learning

Authors: Lukas Bieringer, Kathrin Grosse, Michael Backes, Battista Biggio, Katharina Krombholz | Published: 2021-05-08 | Updated: 2022-06-29

Incompatibility Clustering as a Defense Against Backdoor Poisoning Attacks

Authors: Charles Jin, Melinda Sun, Martin Rinard | Published: 2021-05-08 | Updated: 2023-04-27

De-Pois: An Attack-Agnostic Defense against Data Poisoning Attacks

Authors: Jian Chen, Xuxin Zhang, Rui Zhang, Chen Wang, Ling Liu | Published: 2021-05-08

Blockchain Systems, Technologies and Applications: A Methodology Perspective

Authors: Bin Cao, Zixin Wang, Long Zhang, Daquan Feng, Mugen Peng, Lei Zhang | Published: 2021-05-08

Detecting Security Fixes in Open-Source Repositories using Static Code Analyzers

Authors: Therese Fehrer, Rocío Cabrera Lozoya, Antonino Sabetta, Dario Di Nucci, Damian A. Tamburri | Published: 2021-05-07

Code2Image: Intelligent Code Analysis by Computer Vision Techniques and Application to Vulnerability Prediction

Authors: Zeki Bilgin | Published: 2021-05-07

Tackling Imbalanced Data in Cybersecurity with Transfer Learning: A Case with ROP Payload Detection

Authors: Haizhou Wang, Peng Liu | Published: 2021-05-06

Attack-agnostic Adversarial Detection on Medical Data Using Explainable Machine Learning

Authors: Matthew Watson, Noura Al Moubayed | Published: 2021-05-05

GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks

Authors: Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2021-05-05

An Overview of Laser Injection against Embedded Neural Network Models

Authors: Mathieu Dumont, Pierre-Alain Moellic, Raphael Viera, Jean-Max Dutertre, Rémi Bernhard | Published: 2021-05-04