A Survey on Negative Transfer

Authors: Wen Zhang, Lingfei Deng, Lei Zhang, Dongrui Wu | Published: 2020-09-02 | Updated: 2021-08-09

Vulnerability-Aware Poisoning Mechanism for Online RL with Unknown Dynamics

Authors: Yanchao Sun, Da Huo, Furong Huang | Published: 2020-09-02 | Updated: 2022-02-15

Machine Learning in Generation, Detection, and Mitigation of Cyberattacks in Smart Grid: A Survey

Authors: Nur Imtiazul Haque, Md Hasan Shahriar, Md Golam Dastgir, Anjan Debnath, Imtiaz Parvez, Arif Sarwat, Mohammad Ashiqur Rahman | Published: 2020-09-01

MALCOM: Generating Malicious Comments to Attack Neural Fake News Detection Models

Authors: Thai Le, Suhang Wang, Dongwon Lee | Published: 2020-09-01 | Updated: 2020-09-27

A3Ident: A Two-phased Approach to Identify the Leading Authors of Android Apps

Authors: Wei Wang, Guozhu Meng, Haoyu Wang, Kai Chen, Weimin Ge, Xiaohong Li | Published: 2020-08-31

Imitation Privacy

Authors: Xun Xian, Xinran Wang, Mingyi Hong, Jie Ding, Reza Ghanadan | Published: 2020-08-30

Benchmarking adversarial attacks and defenses for time-series data

Authors: Shoaib Ahmed Siddiqui, Andreas Dengel, Sheraz Ahmed | Published: 2020-08-30

Adversarial Privacy Preserving Graph Embedding against Inference Attack

Authors: Kaiyang Li, Guangchun Luo, Yang Ye, Wei Li, Shihao Ji, Zhipeng Cai | Published: 2020-08-30

Improving Resistance to Adversarial Deformations by Regularizing Gradients

Authors: Pengfei Xia, Bin Li | Published: 2020-08-29 | Updated: 2020-10-06

TRUSTD: Combat Fake Content using Blockchain and Collective Signature Technologies

Authors: Zakwan Jaroucheh, Mohamad Alissa, William J Buchanan | Published: 2020-08-28