NeuroAttack: Undermining Spiking Neural Networks Security through Externally Triggered Bit-Flips

Authors: Valerio Venceslai, Alberto Marchisio, Ihsen Alouani, Maurizio Martina, Muhammad Shafique | Published: 2020-05-16

Encryption Inspired Adversarial Defense for Visual Classification

Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-05-16

Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data

Authors: Deepesh Data, Suhas Diggavi | Published: 2020-05-16

Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness

Authors: Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu | Published: 2020-05-15 | Updated: 2020-06-07

A Deep Learning-based Fine-grained Hierarchical Learning Approach for Robust Malware Classification

Authors: Ahmed Abusnaina, Mohammed Abuhamad, Hisham Alasmary, Afsah Anwar, Rhongho Jang, Saeed Salem, DaeHun Nyang, David Mohaisen | Published: 2020-05-14 | Updated: 2020-05-15

Protecting the integrity of the training procedure of neural networks

Authors: Christian Berghoff | Published: 2020-05-14

Ethical Adversaries: Towards Mitigating Unfairness with Adversarial Machine Learning

Authors: Pieter Delobelle, Paul Temple, Gilles Perrouin, Benoît Frénay, Patrick Heymans, Bettina Berendt | Published: 2020-05-14 | Updated: 2020-09-01

Data Augmentation for Deep Candlestick Learner

Authors: Chia-Ying Tsao, Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai | Published: 2020-05-14 | Updated: 2020-05-29

Prive-HD: Privacy-Preserved Hyperdimensional Computing

Authors: Behnam Khaleghi, Mohsen Imani, Tajana Rosing | Published: 2020-05-14

Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach

Authors: Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan | Published: 2020-05-13