Provable Robust Classification via Learned Smoothed Densities

Authors: Saeed Saremi, Rupesh Srivastava | Published: 2020-05-09

Estimating g-Leakage via Machine Learning

Authors: Marco Romanelli, Konstantinos Chatzikokolakis, Catuscia Palamidessi, Pablo Piantanida | Published: 2020-05-09 | Updated: 2021-11-24

Cloud-based Federated Boosting for Mobile Crowdsensing

Authors: Zhuzhu Wang, Yilong Yang, Yang Liu, Ximeng Liu, Brij B. Gupta, Jianfeng Ma | Published: 2020-05-09

Towards Robustness against Unsuspicious Adversarial Examples

Authors: Liang Tong, Minzhe Guo, Atul Prakash, Yevgeniy Vorobeychik | Published: 2020-05-08 | Updated: 2020-10-08

Provable Training of a ReLU Gate with an Iterative Non-Gradient Algorithm

Authors: Sayar Karmakar, Anirbit Mukherjee | Published: 2020-05-08 | Updated: 2022-04-01

A Review of Computer Vision Methods in Network Security

Authors: Jiawei Zhao, Rahat Masood, Suranga Seneviratne | Published: 2020-05-07

MAZE: Data-Free Model Stealing Attack Using Zeroth-Order Gradient Estimation

Authors: Sanjay Kariyappa, Atul Prakash, Moinuddin Qureshi | Published: 2020-05-06 | Updated: 2022-10-28

Towards Frequency-Based Explanation for Robust CNN

Authors: Zifan Wang, Yilin Yang, Ankit Shrivastava, Varun Rawal, Zihao Ding | Published: 2020-05-06

Insider Threat Detection Based on Stress Recognition Using Keystroke Dynamics

Authors: Azamat Sultanov, Konstantin Kogos | Published: 2020-05-06

Enhancing Intrinsic Adversarial Robustness via Feature Pyramid Decoder

Authors: Guanlin Li, Shuya Ding, Jun Luo, Chang Liu | Published: 2020-05-06