Hardware-Assisted Detection of Firmware Attacks in Inverter-Based Cyberphysical Microgrids

Authors: Abraham Peedikayil Kuruvila, Ioannis Zografopoulos, Kanad Basu, Charalambos Konstantinou | Published: 2020-09-16 | Updated: 2021-04-18

The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services

Authors: Ahmed Mohamed Hussain, Gabriele Oligeri, Thiemo Voigt | Published: 2020-09-16 | Updated: 2021-07-25

Data Poisoning Attacks on Regression Learning and Corresponding Defenses

Authors: Nicolas Michael Müller, Daniel Kowatsch, Konstantin Böttinger | Published: 2020-09-15

Puzzle Mix: Exploiting Saliency and Local Statistics for Optimal Mixup

Authors: Jang-Hyun Kim, Wonho Choo, Hyun Oh Song | Published: 2020-09-15 | Updated: 2020-12-30

Private data sharing between decentralized users through the privGAN architecture

Authors: Jean-Francois Rajotte, Raymond T Ng | Published: 2020-09-14

Robust Deep Learning Ensemble against Deception

Authors: Wenqi Wei, Ling Liu | Published: 2020-09-14

Input Hessian Regularization of Neural Networks

Authors: Waleed Mustafa, Robert A. Vandermeulen, Marius Kloft | Published: 2020-09-14

Dual-Mandate Patrols: Multi-Armed Bandits for Green Security

Authors: Lily Xu, Elizabeth Bondi, Fei Fang, Andrew Perrault, Kai Wang, Milind Tambe | Published: 2020-09-14 | Updated: 2024-04-26

A Game Theoretic Analysis of Additive Adversarial Attacks and Defenses

Authors: Ambar Pal, René Vidal | Published: 2020-09-14 | Updated: 2020-11-11

SAPAG: A Self-Adaptive Privacy Attack From Gradients

Authors: Yijue Wang, Jieren Deng, Dan Guo, Chenghong Wang, Xianrui Meng, Hang Liu, Caiwen Ding, Sanguthevar Rajasekaran | Published: 2020-09-14