Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

Authors: Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan | Published: 2020-05-13

DeepRobust: A PyTorch Library for Adversarial Attacks and Defenses

Authors: Yaxin Li, Wei Jin, Han Xu, Jiliang Tang | Published: 2020-05-13

Android Malware Clustering using Community Detection on Android Packages Similarity Network

Authors: ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb | Published: 2020-05-12

Towards Memory Safe Python Enclave for Security Sensitive Computation

Authors: Huibo Wang, Mingshen Sun, Qian Feng, Pei Wang, Tongxin Li, Yu Ding | Published: 2020-05-12

Perturbing Inputs to Prevent Model Stealing

Authors: Justin Grana | Published: 2020-05-12

A Secure Federated Learning Framework for 5G Networks

Authors: Yi Liu, Jialiang Peng, Jiawen Kang, Abdullah M. Iliyasu, Dusit Niyato, Ahmed A. Abd El-Latif | Published: 2020-05-12

Evaluating Ensemble Robustness Against Adversarial Attacks

Authors: George Adam, Romain Speciel | Published: 2020-05-12

Robustness Verification for Classifier Ensembles

Authors: Dennis Gross, Nils Jansen, Guillermo A. Pérez, Stephan Raaijmakers | Published: 2020-05-12 | Updated: 2020-07-09

Byzantine-Robust Decentralized Stochastic Optimization over Static and Time-Varying Networks

Authors: Jie Peng, Weiyu Li, Qing Ling | Published: 2020-05-12 | Updated: 2020-12-18

Spanning Attack: Reinforce Black-box Attacks with Unlabeled Data

Authors: Lu Wang, Huan Zhang, Jinfeng Yi, Cho-Jui Hsieh, Yuan Jiang | Published: 2020-05-11 | Updated: 2020-11-10