A Generative Machine Learning Approach to Policy Optimization in Pursuit-Evasion Games

Authors: Shiva Navabi, Osonde A. Osoba | Published: 2020-10-04 | Updated: 2020-10-13

DNS Covert Channel Detection via Behavioral Analysis: a Machine Learning Approach

Authors: Salvatore Saeli, Federica Bisio, Pierangelo Lombardo, Danilo Massa | Published: 2020-10-04

Data Analytics-enabled Intrusion Detection: Evaluations of ToN_IoT Linux Datasets

Authors: Nour Moustafa, Mohiuddin Ahmed, Sherif Ahmed | Published: 2020-10-04

Multi-Step Adversarial Perturbations on Recommender Systems Embeddings

Authors: Vito Walter Anelli, Alejandro Bellogín, Yashar Deldjoo, Tommaso Di Noia, Felice Antonio Merra | Published: 2020-10-03

Do Wider Neural Networks Really Help Adversarial Robustness?

Authors: Boxi Wu, Jinghui Chen, Deng Cai, Xiaofei He, Quanquan Gu | Published: 2020-10-03 | Updated: 2021-08-14

CorrAttack: Black-box Adversarial Attack with Structured Search

Authors: Zhichao Huang, Yaowei Huang, Tong Zhang | Published: 2020-10-03

Query complexity of adversarial attacks

Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2020-10-02 | Updated: 2021-02-10

An alternative proof of the vulnerability of retrieval in high intrinsic dimensionality neighborhood

Authors: Teddy Furon | Published: 2020-10-02 | Updated: 2022-05-20

Deep learning for time series classification

Authors: Hassan Ismail Fawaz | Published: 2020-10-01

Bag of Tricks for Adversarial Training

Authors: Tianyu Pang, Xiao Yang, Yinpeng Dong, Hang Su, Jun Zhu | Published: 2020-10-01 | Updated: 2021-03-31