QEBA: Query-Efficient Boundary-Based Blackbox Attack

Authors: Huichen Li, Xiaojun Xu, Xiaolu Zhang, Shuang Yang, Bo Li | Published: 2020-05-28

Deceptive Deletions for Protecting Withdrawn Posts on Social Platforms

Authors: Mohsen Minaei, S Chandra Mouli, Mainack Mondal, Bruno Ribeiro, Aniket Kate | Published: 2020-05-28

Blockchain is Watching You: Profiling and Deanonymizing Ethereum Users

Authors: Ferenc Béres, István András Seres, András A. Benczúr, Mikerah Quintyne-Collins | Published: 2020-05-28 | Updated: 2020-10-13

Efficient Privacy-Preserving Electricity Theft Detection with Dynamic Billing and Load Monitoring for AMI Networks

Authors: Mohamed I. Ibrahem, Mahmoud Nabil, Mostafa M. Fouda, Mohamed Mahmoud, Waleed Alasmary, Fawaz Alsolami | Published: 2020-05-28

COVID-19 and Your Smartphone: BLE-based Smart Contact Tracing

Authors: Pai Chet Ng, Petros Spachos, Konstantinos Plataniotis | Published: 2020-05-28

On the Difficulty of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22

Stochastic Security: Adversarial Defense Using Long-Run Dynamics of Energy-Based Models

Authors: Mitch Hill, Jonathan Mitchell, Song-Chun Zhu | Published: 2020-05-27 | Updated: 2021-03-18

Enhancing Resilience of Deep Learning Networks by Means of Transferable Adversaries

Authors: Moritz Seiler, Heike Trautmann, Pascal Kerschke | Published: 2020-05-27

SafeML: Safety Monitoring of Machine Learning Classifiers through Statistical Difference Measure

Authors: Koorosh Aslansefat, Ioannis Sorokos, Declan Whiting, Ramin Tavakoli Kolagari, Yiannis Papadopoulos | Published: 2020-05-27

Effects of Forward Error Correction on Communications Aware Evasion Attacks

Authors: Matthew DelVecchio, Bryse Flowers, William C. Headley | Published: 2020-05-27