A Survey of Machine Learning Methods for Detecting False Data Injection Attacks in Power Systems

Authors: Ali Sayghe, Yaodan Hu, Ioannis Zografopoulos, XiaoRui Liu, Raj Gautam Dutta, Yier Jin, Charalambos Konstantinou | Published: 2020-08-16

TextDecepter: Hard Label Black Box Attack on Text Classifiers

Authors: Sachin Saxena | Published: 2020-08-16 | Updated: 2020-12-28

Adversary Agnostic Robust Deep Reinforcement Learning

Authors: Xinghua Qu, Yew-Soon Ong, Abhishek Gupta, Zhu Sun | Published: 2020-08-14 | Updated: 2020-12-24

Sniffing for Codebase Secret Leaks with Known Production Secrets in Industry

Authors: Zhen Yu Ding, Benjamin Khakshoor, Justin Paglierani, Mantej Rajpal | Published: 2020-08-13

Deep-Lock: Secure Authorization for Deep Neural Networks

Authors: Manaar Alam, Sayandeep Saha, Debdeep Mukhopadhyay, Sandip Kundu | Published: 2020-08-13 | Updated: 2024-02-18

Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware Analysis

Authors: Ming Fan, Wenying Wei, Xiaofei Xie, Yang Liu, Xiaohong Guan, Ting Liu | Published: 2020-08-13

Detecting Abnormal Traffic in Large-Scale Networks

Authors: Mahmoud Said Elsayed, Nhien-An Le-Khac, Soumyabrata Dev, Anca Delia Jurcut | Published: 2020-08-13

WAFFLe: Weight Anonymized Factorization for Federated Learning

Authors: Weituo Hao, Nikhil Mehta, Kevin J Liang, Pengyu Cheng, Mostafa El-Khamy, Lawrence Carin | Published: 2020-08-13

Learning to Learn from Mistakes: Robust Optimization for Adversarial Noise

Authors: Alex Serban, Erik Poll, Joost Visser | Published: 2020-08-12

Revisiting Adversarially Learned Injection Attacks Against Recommender Systems

Authors: Jiaxi Tang, Hongyi Wen, Ke Wang | Published: 2020-08-11 | Updated: 2020-08-28