Perturbing Across the Feature Hierarchy to Improve Standard and Strict Blackbox Attack Transferability

Authors: Nathan Inkawhich, Kevin J Liang, Binghui Wang, Matthew Inkawhich, Lawrence Carin, Yiran Chen | Published: 2020-04-29

Wide-AdGraph: Detecting Ad Trackers with a Wide Dependency Chain Graph

Authors: Amir Hossein Kargaran, Mohammad Sadegh Akhondzadeh, Mohammad Reza Heidarpour, Mohammad Hossein Manshaei, Kave Salamatian, Masoud Nejad Sattary | Published: 2020-04-29 | Updated: 2021-05-10

Dynamic Anomaly Detection with High-fidelity Simulators: A Convex Optimization Approach

Authors: Kaikai Pan, Peter Palensky, Peyman Mohajerin Esfahani | Published: 2020-04-29 | Updated: 2020-10-06

Minority Reports Defense: Defending Against Adversarial Patches

Authors: Michael McCoyd, Won Park, Steven Chen, Neil Shah, Ryan Roggenkemper, Minjune Hwang, Jason Xinyu Liu, David Wagner | Published: 2020-04-28

Adversarial Learning Guarantees for Linear Hypotheses and Neural Networks

Authors: Pranjal Awasthi, Natalie Frank, Mehryar Mohri | Published: 2020-04-28

Private Dataset Generation Using Privacy Preserving Collaborative Learning

Authors: Amit Chaulwar | Published: 2020-04-28

Attacks on Image Encryption Schemes for Privacy-Preserving Deep Neural Networks

Authors: Alex Habeen Chang, Benjamin M. Case | Published: 2020-04-28 | Updated: 2020-04-29

Data-Driven Model-Based Analysis of the Ethereum Verifier’s Dilemma

Authors: Maher Alharby, Roben Castagna Lunardi, Amjad Aldweesh, Aad van Moorsel | Published: 2020-04-27

Transferable Perturbations of Deep Feature Distributions

Authors: Nathan Inkawhich, Kevin J Liang, Lawrence Carin, Yiran Chen | Published: 2020-04-27

Printing and Scanning Attack for Image Counter Forensics

Authors: Hailey Joren, Otkrist Gupta, Dan Raviv | Published: 2020-04-27 | Updated: 2020-06-24