On the (Un)Reliability of Privacy Policies in Android Apps

Authors: Luca Verderame, Davide Caputo, Andrea Romdhana, Alessio Merlo | Published: 2020-04-18

Learning the Associations of MITRE ATT&CK Adversarial Techniques

Authors: Rawan Al-Shaer, Jonathan M. Spring, Eliana Christou | Published: 2020-04-16 | Updated: 2020-05-12

Hybrid Blockchain-Enabled Secure Microservices Fabric for Decentralized Multi-Domain Avionics Systems

Authors: Ronghua Xu, Yu Chen, Erik Blasch, Alexander Aved, Genshe Chen, Dan Shen | Published: 2020-04-16

Feature Selection and Intrusion Detection in Cloud Environment based on Machine Learning Algorithms

Authors: Amir Javadpour, Sanaz Kazemi Abharian, Guojun Wang | Published: 2020-04-15

Advanced Evasion Attacks and Mitigations on Practical ML-Based Phishing Website Classifiers

Authors: Yusi Lei, Sen Chen, Lingling Fan, Fu Song, Yang Liu | Published: 2020-04-15

Poisoning Attacks on Algorithmic Fairness

Authors: David Solans, Battista Biggio, Carlos Castillo | Published: 2020-04-15 | Updated: 2020-06-26

Weight Poisoning Attacks on Pre-trained Models

Authors: Keita Kurita, Paul Michel, Graham Neubig | Published: 2020-04-14

Extending Adversarial Attacks to Produce Adversarial Class Probability Distributions

Authors: Jon Vadillo, Roberto Santana, Jose A. Lozano | Published: 2020-04-14 | Updated: 2023-01-25

Towards Robust Classification with Image Quality Assessment

Authors: Yeli Feng, Yiyu Cai | Published: 2020-04-14

DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments

Authors: Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi | Published: 2020-04-12