Tempered Sigmoid Activations for Deep Learning with Differential Privacy

Authors: Nicolas Papernot, Abhradeep Thakurta, Shuang Song, Steve Chien, Úlfar Erlingsson | Published: 2020-07-28

Reachable Sets of Classifiers and Regression Models: (Non-)Robustness Analysis and Robust Training

Authors: Anna-Kathrin Kopetzki, Stephan Günnemann | Published: 2020-07-28 | Updated: 2021-05-12

Derivation of Information-Theoretically Optimal Adversarial Attacks with Applications to Robust Machine Learning

Authors: Jirong Yi, Raghu Mudumbai, Weiyu Xu | Published: 2020-07-28

Swipe dynamics as a means of authentication: results from a Bayesian unsupervised approach

Authors: Parker Lamb, Alexander Millar, Ramon Fuentes | Published: 2020-07-27 | Updated: 2020-10-13

EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection

Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby | Published: 2020-07-27 | Updated: 2020-10-15

Feature importance in mobile malware detection

Authors: Vasileios Kouliaridis, Georgios Kambourakis, Tao Peng | Published: 2020-07-27 | Updated: 2020-08-28

Evaluation of Federated Learning in Phishing Email Detection

Authors: Chandra Thapa, Jun Wen Tang, Alsharif Abuadbba, Yansong Gao, Seyit Camtepe, Surya Nepal, Mahathir Almashor, Yifeng Zheng | Published: 2020-07-27 | Updated: 2021-05-21

Detecting malicious PDF using CNN

Authors: Raphael Fettaya, Yishay Mansour | Published: 2020-07-24 | Updated: 2020-08-02

Provably Robust Adversarial Examples

Authors: Dimitar I. Dimitrov, Gagandeep Singh, Timon Gehr, Martin Vechev | Published: 2020-07-23 | Updated: 2022-03-17

Hide-and-Seek Privacy Challenge

Authors: James Jordon, Daniel Jarrett, Jinsung Yoon, Tavian Barnes, Paul Elbers, Patrick Thoral, Ari Ercole, Cheng Zhang, Danielle Belgrave, Mihaela van der Schaar | Published: 2020-07-23 | Updated: 2020-07-24