Detection and Analysis of Drive-by Downloads and Malicious Websites

Authors: Saeed Ibrahim, Nawwaf Al Herami, Ebrahim Al Naqbi, Monther Aldwairi | Published: 2020-02-19 | Updated: 2020-04-09

Action-Manipulation Attacks Against Stochastic Bandits: Attacks and Defense

Authors: Guanlin Liu, Lifeng lai | Published: 2020-02-19 | Updated: 2020-02-21

Towards Query-Efficient Black-Box Adversary with Zeroth-Order Natural Gradient Descent

Authors: Pu Zhao, Pin-Yu Chen, Siyue Wang, Xue Lin | Published: 2020-02-18

Deflecting Adversarial Attacks

Authors: Yao Qin, Nicholas Frosst, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2020-02-18

On the Matrix-Free Generation of Adversarial Perturbations for Black-Box Attacks

Authors: Hisaichi Shibata, Shouhei Hanaoka, Yukihiro Nomura, Naoto Hayashi, Osamu Abe | Published: 2020-02-18

TensorShield: Tensor-based Defense Against Adversarial Attacks on Images

Authors: Negin Entezari, Evangelos E. Papalexakis | Published: 2020-02-18

Regularized Training and Tight Certification for Randomized Smoothed Classifier with Provable Robustness

Authors: Huijie Feng, Chunpeng Wu, Guoyang Chen, Weifeng Zhang, Yang Ning | Published: 2020-02-17

Robust Stochastic Bandit Algorithms under Probabilistic Unbounded Adversarial Attack

Authors: Ziwei Guan, Kaiyi Ji, Donald J Bucci Jr, Timothy Y Hu, Joseph Palombo, Michael Liston, Yingbin Liang | Published: 2020-02-17

Scalable Quantitative Verification For Deep Neural Networks

Authors: Teodora Baluta, Zheng Leong Chua, Kuldeep S. Meel, Prateek Saxena | Published: 2020-02-17 | Updated: 2021-03-23

Data and Model Dependencies of Membership Inference Attack

Authors: Shakila Mahjabin Tonni, Dinusha Vatsalan, Farhad Farokhi, Dali Kaafar, Zhigang Lu, Gioacchino Tangari | Published: 2020-02-17 | Updated: 2020-07-25