End-to-end anti-spoofing with RawNet2

Authors: Hemlata Tak, Jose Patino, Massimiliano Todisco, Andreas Nautsch, Nicholas Evans, Anthony Larcher | Published: 2020-11-02 | Updated: 2021-12-16

On No-Sensing Adversarial Multi-player Multi-armed Bandits with Collision Communications

Authors: Chengshuai Shi, Cong Shen | Published: 2020-11-02 | Updated: 2021-04-24

Differentially Private ADMM Algorithms for Machine Learning

Authors: Tao Xu, Fanhua Shang, Yuanyuan Liu, Hongying Liu, Longjie Shen, Maoguo Gong | Published: 2020-10-31

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers

Authors: Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2020-10-30

Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme

Authors: Kunjal Panchal | Published: 2020-10-29

CURE: A Security Architecture with CUstomizable and Resilient Enclaves

Authors: Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf | Published: 2020-10-29

Reliable Graph Neural Networks via Robust Aggregation

Authors: Simon Geisler, Daniel Zügner, Stephan Günnemann | Published: 2020-10-29

Evaluating Robustness of Predictive Uncertainty Estimation: Are Dirichlet-based Models Reliable?

Authors: Anna-Kathrin Kopetzki, Bertrand Charpentier, Daniel Zügner, Sandhya Giri, Stephan Günnemann | Published: 2020-10-28 | Updated: 2021-06-11

Generalized Insider Attack Detection Implementation using NetFlow Data

Authors: Yash Samtani, Jesse Elwell | Published: 2020-10-27

FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries

Authors: Seng Pei Liew, Tsubasa Takahashi | Published: 2020-10-27