Training DNN Model with Secret Key for Model Protection

Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-08-06

Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection

Authors: MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami | Published: 2020-08-05

Robust Deep Reinforcement Learning through Adversarial Loss

Authors: Tuomas Oikarinen, Wang Zhang, Alexandre Megretski, Luca Daniel, Tsui-Wei Weng | Published: 2020-08-05 | Updated: 2021-11-10

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence

Authors: Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip S. Yu | Published: 2020-08-05

TREND: Transferability based Robust ENsemble Design

Authors: Deepak Ravikumar, Sangamesh Kodge, Isha Garg, Kaushik Roy | Published: 2020-08-04 | Updated: 2021-03-30

Unacceptable, where is my privacy? Exploring Accidental Triggers of Smart Speakers

Authors: Lea Schönherr, Maximilian Golla, Thorsten Eisenhofer, Jan Wiele, Dorothea Kolossa, Thorsten Holz | Published: 2020-08-02

Towards Class-Oriented Poisoning Attacks Against Neural Networks

Authors: Bingyin Zhao, Yingjie Lao | Published: 2020-07-31 | Updated: 2021-10-11

Adversarial Attacks with Multiple Antennas Against Deep Learning-Based Modulation Classifiers

Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Kemal Davaslioglu, Sennur Ulukus | Published: 2020-07-31

TEAM: We Need More Powerful Adversarial Examples for DNNs

Authors: Yaguan Qian, Ximin Zhang, Bin Wang, Wei Li, Zhaoquan Gu, Haijiang Wang, Wassim Swaileh | Published: 2020-07-31 | Updated: 2020-08-10

Practical Detection of Trojan Neural Networks: Data-Limited and Data-Free Cases

Authors: Ren Wang, Gaoyuan Zhang, Sijia Liu, Pin-Yu Chen, Jinjun Xiong, Meng Wang | Published: 2020-07-31