On the Resilience of Biometric Authentication Systems against Random Inputs

Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Mohamed Ali Kaafar | Published: 2020-01-13 | Updated: 2020-01-24

Membership Inference Attacks Against Object Detection Models

Authors: Yeachan Park, Myungjoo Kang | Published: 2020-01-12 | Updated: 2020-01-28

Fast is better than free: Revisiting adversarial training

Authors: Eric Wong, Leslie Rice, J. Zico Kolter | Published: 2020-01-12

Simulated Blockchains for Machine Learning Traceability and Transaction Values in the Monero Network

Authors: Nathan Borggren, Hyoung-yoon Kim, Lihan Yao, Gary Koplik | Published: 2020-01-12

Campfire: Compressible, Regularization-Free, Structured Sparse Training for Hardware Accelerators

Authors: Noah Gamboa, Kais Kudrolli, Anand Dhoot, Ardavan Pedram | Published: 2020-01-09 | Updated: 2020-01-13

Real-Time Edge Intelligence in the Making: A Collaborative Learning Framework via Federated Meta-Learning

Authors: Sen Lin, Guang Yang, Junshan Zhang | Published: 2020-01-09 | Updated: 2020-05-08

Secure multiparty computations in floating-point arithmetic

Authors: Chuan Guo, Awni Hannun, Brian Knott, Laurens van der Maaten, Mark Tygert, Ruiyu Zhu | Published: 2020-01-09

Explainable Deep Convolutional Candlestick Learner

Authors: Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai, Chih-Shiang Shur | Published: 2020-01-08 | Updated: 2020-05-29

To Transfer or Not to Transfer: Misclassification Attacks Against Transfer Learned Text Classifiers

Authors: Bijeeta Pal, Shruti Tople | Published: 2020-01-08

MACER: Attack-free and Scalable Robust Training via Maximizing Certified Radius

Authors: Runtian Zhai, Chen Dan, Di He, Huan Zhang, Boqing Gong, Pradeep Ravikumar, Cho-Jui Hsieh, Liwei Wang | Published: 2020-01-08 | Updated: 2022-03-14