Adversarial Data Encryption

Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats & Countermeasures

Authors: Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman | Published: 2020-02-10 | Updated: 2020-08-06

Feature-level Malware Obfuscation in Deep Learning

Authors: Keith Dillon | Published: 2020-02-10

Robust binary classification with the 01 loss

Authors: Yunzhe Xue, Meiyan Xie, Usman Roshan | Published: 2020-02-09

Input Validation for Neural Networks via Runtime Local Robustness Verification

Authors: Jiangchao Liu, Liqian Chen, Antoine Mine, Ji Wang | Published: 2020-02-09 | Updated: 2024-02-13

MDEA: Malware Detection with Evolutionary Adversarial Learning

Authors: Xiruo Wang, Risto Miikkulainen | Published: 2020-02-09 | Updated: 2020-04-17

Curse of Dimensionality on Randomized Smoothing for Certifiable Robustness

Authors: Aounon Kumar, Alexander Levine, Tom Goldstein, Soheil Feizi | Published: 2020-02-08 | Updated: 2020-08-14

Analysis of Random Perturbations for Robust Convolutional Neural Networks

Authors: Adam Dziedzic, Sanjay Krishnan | Published: 2020-02-08 | Updated: 2020-06-07

Certified Robustness to Label-Flipping Attacks via Randomized Smoothing

Authors: Elan Rosenfeld, Ezra Winston, Pradeep Ravikumar, J. Zico Kolter | Published: 2020-02-07 | Updated: 2020-08-11

Renofeation: A Simple Transfer Learning Method for Improved Adversarial Robustness

Authors: Ting-Wu Chin, Cha Zhang, Diana Marculescu | Published: 2020-02-07 | Updated: 2021-04-28