TOG: Targeted Adversarial Objectness Gradient Attacks on Real-time Object Detection Systems

Authors: Ka-Ho Chow, Ling Liu, Mehmet Emre Gursoy, Stacey Truex, Wenqi Wei, Yanzhao Wu | Published: 2020-04-09

Deep Learning and Open Set Malware Classification: A Survey

Authors: Jingyun Jia | Published: 2020-04-08

High Accuracy Phishing Detection Based on Convolutional Neural Networks

Authors: Suleiman Y. Yerima, Mohammed K. Alzaylaee | Published: 2020-04-08

Feature Partitioning for Robust Tree Ensembles and their Certification in Adversarial Scenarios

Authors: Stefano Calzavara, Claudio Lucchese, Federico Marcuzzi, Salvatore Orlando | Published: 2020-04-07

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Authors: Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg | Published: 2020-04-07

Challenges in Forecasting Malicious Events from Incomplete Data

Authors: Nazgol Tavabi, Andrés Abeliuk, Negar Mokhberian, Jeremy Abramson, Kristina Lerman | Published: 2020-04-06

Hardware Trojan Detection Using Controlled Circuit Aging

Authors: Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Kanad Basu, Jörg Henkel, Ramesh Karri, Farshad Khorrami | Published: 2020-04-06 | Updated: 2020-04-21

Embedding Java Classes with code2vec: Improvements from Variable Obfuscation

Authors: Rhys Compton, Eibe Frank, Panos Patros, Abigail Koay | Published: 2020-04-06

PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks

Authors: Kalikinkar Mandal, Guang Gong | Published: 2020-04-05

Private Knowledge Transfer via Model Distillation with Generative Adversarial Networks

Authors: Di Gao, Cheng Zhuo | Published: 2020-04-05