Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack

Authors: Bo Zhang, Ruotong Yu, Haipei Sun, Yanying Li, Jun Xu, Hui Wang | Published: 2020-01-24

On the human evaluation of audio adversarial examples

Authors: Jon Vadillo, Roberto Santana | Published: 2020-01-23 | Updated: 2021-02-12

Adversarial Attack on Community Detection by Hiding Individuals

Authors: Jia Li, Honglei Zhang, Zhichao Han, Yu Rong, Hong Cheng, Junzhou Huang | Published: 2020-01-22

Massif: Interactive Interpretation of Adversarial Attacks on Deep Learning

Authors: Nilaksh Das, Haekyu Park, Zijie J. Wang, Fred Hohman, Robert Firstman, Emily Rogers, Duen Horng Chau | Published: 2020-01-21 | Updated: 2020-02-16

HRFA: High-Resolution Feature-based Attack

Authors: Zhixing Ye, Sizhe Chen, Peidong Zhang, Chengjin Sun, Xiaolin Huang | Published: 2020-01-21 | Updated: 2020-10-22

Secure and Robust Machine Learning for Healthcare: A Survey

Authors: Adnan Qayyum, Junaid Qadir, Muhammad Bilal, Ala Al-Fuqaha | Published: 2020-01-21

An Intelligent and Time-Efficient DDoS Identification Framework for Real-Time Enterprise Networks SAD-F: Spark Based Anomaly Detection Framework

Authors: Awais Ahmed, Sufian Hameed, Muhammad Rafi, Qublai Khan Ali Mirza | Published: 2020-01-21 | Updated: 2020-02-14

Intelligent Methods for Accurately Detecting Phishing Websites

Authors: Almaha Abuzuraiq, Mouhammd Alkasassbeh, Mohammad Almseidin | Published: 2020-01-19

Pelican: A Deep Residual Network for Network Intrusion Detection

Authors: Peilun Wu, Hui Guo, Nour Moustafa | Published: 2020-01-19 | Updated: 2020-05-08

Ownership preserving AI Market Places using Blockchain

Authors: Nishant Baranwal Somy, Kalapriya Kannan, Vijay Arya, Sandeep Hans, Abhishek Singh, Pranay Lohia, Sameep Mehta | Published: 2020-01-18