Robustifying $\ell_\infty$ Adversarial Training to the Union of Perturbation Models

Authors: Ameya D. Patil, Michael Tuttle, Alexander G. Schwing, Naresh R. Shanbhag | Published: 2021-05-31 | Updated: 2021-06-11

Evaluating Resilience of Encrypted Traffic Classification Against Adversarial Evasion Attacks

Authors: Ramy Maarouf, Danish Sattar, Ashraf Matrawy | Published: 2021-05-30

Rethinking Noisy Label Models: Labeler-Dependent Noise with Adversarial Awareness

Authors: Glenn Dawson, Robi Polikar | Published: 2021-05-28 | Updated: 2021-06-05

DeepMoM: Robust Deep Learning With Median-of-Means

Authors: Shih-Ting Huang, Johannes Lederer | Published: 2021-05-28 | Updated: 2021-11-08

Network Activities Recognition and Analysis Based on Supervised Machine Learning Classification Methods Using J48 and Naïve Bayes Algorithm

Authors: Fan Huang | Published: 2021-05-28

Resilient and Adaptive Framework for Large Scale Android Malware Fingerprinting using Deep Learning and NLP Techniques

Authors: ElMouatez Billah Karbab, Mourad Debbabi | Published: 2021-05-27

Intrusion Detection using Machine Learning Techniques: An Experimental Comparison

Authors: Kathryn-Ann Tait, Jan Sher Khan, Fehaid Alqahtani, Awais Aziz Shah, Fadia Ali Khan, Mujeeb Ur Rehman, Wadii Boulila, Jawad Ahmad | Published: 2021-05-27

On Privacy and Confidentiality of Communications in Organizational Graphs

Authors: Masoumeh Shafieinejad, Huseyin Inan, Marcello Hasegawa, Robert Sim | Published: 2021-05-27

Fooling Partial Dependence via Data Poisoning

Authors: Hubert Baniecki, Wojciech Kretowicz, Przemyslaw Biecek | Published: 2021-05-26 | Updated: 2022-07-10

MTH-IDS: A Multi-Tiered Hybrid Intrusion Detection System for Internet of Vehicles

Authors: Li Yang, Abdallah Moubayed, Abdallah Shami | Published: 2021-05-26