Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward

Authors: Momina Masood, Marriam Nawaz, Khalid Mahmood Malik, Ali Javed, Aun Irtaza | Published: 2021-02-25 | Updated: 2021-11-23

Identifying Untrustworthy Predictions in Neural Networks by Geometric Gradient Analysis

Authors: Leo Schwinn, An Nguyen, René Raab, Leon Bungert, Daniel Tenbrinck, Dario Zanca, Martin Burger, Bjoern Eskofier | Published: 2021-02-24

Adversarial Robustness with Non-uniform Perturbations

Authors: Ecenaz Erdemir, Jeffrey Bickford, Luca Melis, Sergul Aydore | Published: 2021-02-24 | Updated: 2021-10-29

Learner-Private Convex Optimization

Authors: Jiaming Xu, Kuang Xu, Dana Yang | Published: 2021-02-23 | Updated: 2021-10-23

Resilience of Bayesian Layer-Wise Explanations under Adversarial Attacks

Authors: Ginevra Carbone, Guido Sanguinetti, Luca Bortolussi | Published: 2021-02-22 | Updated: 2022-05-05

A Zeroth-Order Block Coordinate Descent Algorithm for Huge-Scale Black-Box Optimization

Authors: HanQin Cai, Yuchen Lou, Daniel McKenzie, Wotao Yin | Published: 2021-02-21 | Updated: 2021-06-11

A flow-based IDS using Machine Learning in eBPF

Authors: Maximilian Bachl, Joachim Fabini, Tanja Zseby | Published: 2021-02-19 | Updated: 2022-03-04

Bridging the Gap Between Adversarial Robustness and Optimization Bias

Authors: Fartash Faghri, Sven Gowal, Cristina Vasconcelos, David J. Fleet, Fabian Pedregosa, Nicolas Le Roux | Published: 2021-02-17 | Updated: 2021-06-07

IoTDevID: A Behavior-Based Device Identification Method for the IoT

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2021-02-17 | Updated: 2022-07-19

ppAURORA: Privacy Preserving Area Under Receiver Operating Characteristic and Precision-Recall Curves

Authors: Ali Burak Ünal, Nico Pfeifer, Mete Akgün | Published: 2021-02-17 | Updated: 2023-06-15