Feature Partitioning for Robust Tree Ensembles and their Certification in Adversarial Scenarios

Authors: Stefano Calzavara, Claudio Lucchese, Federico Marcuzzi, Salvatore Orlando | Published: 2020-04-07

Adversarial Genetic Programming for Cyber Security: A Rising Application Domain Where GP Matters

Authors: Una-May O'Reilly, Jamal Toutouh, Marcos Pertierra, Daniel Prado Sanchez, Dennis Garcia, Anthony Erb Luogo, Jonathan Kelly, Erik Hemberg | Published: 2020-04-07

Challenges in Forecasting Malicious Events from Incomplete Data

Authors: Nazgol Tavabi, Andrés Abeliuk, Negar Mokhberian, Jeremy Abramson, Kristina Lerman | Published: 2020-04-06

Hardware Trojan Detection Using Controlled Circuit Aging

Authors: Virinchi Roy Surabhi, Prashanth Krishnamurthy, Hussam Amrouch, Kanad Basu, Jörg Henkel, Ramesh Karri, Farshad Khorrami | Published: 2020-04-06 | Updated: 2020-04-21

Embedding Java Classes with code2vec: Improvements from Variable Obfuscation

Authors: Rhys Compton, Eibe Frank, Panos Patros, Abigail Koay | Published: 2020-04-06

PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks

Authors: Kalikinkar Mandal, Guang Gong | Published: 2020-04-05

Private Knowledge Transfer via Model Distillation with Generative Adversarial Networks

Authors: Di Gao, Cheng Zhuo | Published: 2020-04-05

Differential 3D Facial Recognition: Adding 3D to Your State-of-the-Art 2D Method

Authors: J. Matias Di Martino, Fernando Suzacq, Mauricio Delbracio, Qiang Qiu, Guillermo Sapiro | Published: 2020-04-03

An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies

Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01

Botnet Detection Using Recurrent Variational Autoencoder

Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu | Published: 2020-04-01