Variational Encoder-based Reliable Classification

Authors: Chitresh Bhushan, Zhaoyuan Yang, Nurali Virani, Naresh Iyer | Published: 2020-02-19 | Updated: 2020-10-17

Randomized Smoothing of All Shapes and Sizes

Authors: Greg Yang, Tony Duan, J. Edward Hu, Hadi Salman, Ilya Razenshteyn, Jerry Li | Published: 2020-02-19 | Updated: 2020-07-23

Influence Function based Data Poisoning Attacks to Top-N Recommender Systems

Authors: Minghong Fang, Neil Zhenqiang Gong, Jia Liu | Published: 2020-02-19 | Updated: 2020-05-31

Indirect Adversarial Attacks via Poisoning Neighbors for Graph Convolutional Networks

Authors: Tsubasa Takahashi | Published: 2020-02-19

Detection and Analysis of Drive-by Downloads and Malicious Websites

Authors: Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi | Published: 2020-02-19 | Updated: 2020-04-09

Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense

Authors: Guanlin Liu, Lifeng lai | Published: 2020-02-19 | Updated: 2020-02-21

Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent

Authors: Pu Zhao, Pin-Yu Chen, Siyue Wang, Xue Lin | Published: 2020-02-18

Deflecting Adversarial Attacks

Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18

On the Matrix-Free Generation of Adversarial Perturbations for Black-Box Attacks

Authors: Hisaichi Shibata, Shouhei Hanaoka, Yukihiro Nomura, Naoto Hayashi, Osamu Abe | Published: 2020-02-18

TensorShield: Tensor-based Defense Against Adversarial Attacks on Images

Authors: Negin Entezari, Evangelos E. Papalexakis | Published: 2020-02-18