SearchFromFree: Adversarial Measurements for Machine Learning-based Energy Theft Detection

Authors: Jiangnan Li, Yingyuan Yang, Jinyuan Stella Sun | Published: 2020-06-02 | Updated: 2020-08-30

Sparse Perturbations for Improved Convergence in Stochastic Zeroth-Order Optimization

Authors: Mayumi Ohta, Nathaniel Berger, Artem Sokolov, Stefan Riezler | Published: 2020-06-02 | Updated: 2020-06-29

Perturbation Analysis of Gradient-based Adversarial Attacks

Authors: Utku Ozbulak, Manvel Gasparyan, Wesley De Neve, Arnout Van Messem | Published: 2020-06-02

Exploring the role of Input and Output Layers of a Deep Neural Network in Adversarial Defense

Authors: Jay N. Paranjape, Rahul Kumar Dubey, Vijendran V Gopalan | Published: 2020-06-02

Rethinking Empirical Evaluation of Adversarial Robustness Using First-Order Attack Methods

Authors: Kyungmi Lee, Anantha P. Chandrakasan | Published: 2020-06-01

DarKnight: A Data Privacy Scheme for Training and Inference of Deep Neural Networks

Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2020-06-01 | Updated: 2020-10-15

Pruning via Iterative Ranking of Sensitivity Statistics

Authors: Stijn Verdenius, Maarten Stol, Patrick Forré | Published: 2020-06-01 | Updated: 2020-06-14

Adversarial Attacks on Reinforcement Learning based Energy Management Systems of Extended Range Electric Delivery Vehicles

Authors: Pengyue Wang, Yan Li, Shashi Shekhar, William F. Northrop | Published: 2020-06-01

Evaluations and Methods for Explanation through Robustness Analysis

Authors: Cheng-Yu Hsieh, Chih-Kuan Yeh, Xuanqing Liu, Pradeep Ravikumar, Seungyeon Kim, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2020-05-31 | Updated: 2021-04-08

Algorithm Selection Framework for Cyber Attack Detection

Authors: Marc Chalé, Nathaniel D. Bastian, Jeffery Weir | Published: 2020-05-28