Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization

Authors: Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan | Published: 2020-10-24 | Updated: 2021-11-30

Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning

Authors: ibrahim Yilmaz, Ambareen Siraj | Published: 2020-10-23

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23

Investigating Membership Inference Attacks under Data Dependencies

Authors: Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum | Published: 2020-10-23 | Updated: 2023-06-14

A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric

Authors: Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-10-22

Getting Passive Aggressive About False Positives: Patching Deployed Malware Detectors

Authors: Edward Raff, Bobby Filar, James Holt | Published: 2020-10-22

Machine Learning-Based Early Detection of IoT Botnets Using Network-Edge Traffic

Authors: Ayush Kumar, Mrinalini Shridhar, Sahithya Swaminathan, Teng Joon Lim | Published: 2020-10-22

Maximum Mean Discrepancy Test is Aware of Adversarial Attacks

Authors: Ruize Gao, Feng Liu, Jingfeng Zhang, Bo Han, Tongliang Liu, Gang Niu, Masashi Sugiyama | Published: 2020-10-22 | Updated: 2021-07-11

Certified Distributional Robustness on Smoothed Classifiers

Authors: Jungang Yang, Liyao Xiang, Ruidong Chen, Yukun Wang, Wei Wang, Xinbing Wang | Published: 2020-10-21 | Updated: 2021-04-30

Amnesiac Machine Learning

Authors: Laura Graves, Vineel Nagisetty, Vijay Ganesh | Published: 2020-10-21