Politics of Adversarial Machine Learning

Authors: Kendra Albert, Jonathon Penney, Bruce Schneier, Ram Shankar Siva Kumar | Published: 2020-02-01 | Updated: 2020-04-26

An Autonomous Intrusion Detection System Using an Ensemble of Advanced Learners

Authors: Amir Andalib, Vahid Tabataba Vakili | Published: 2020-01-31 | Updated: 2020-12-29

FastWordBug: A Fast Method To Generate Adversarial Text Against NLP Applications

Authors: Dou Goodman, Lv Zhonghou, Wang minghua | Published: 2020-01-31

Adversarial Attacks on Convolutional Neural Networks in Facial Recognition Domain

Authors: Yigit Alparslan, Ken Alparslan, Jeremy Keim-Shenk, Shweta Khade, Rachel Greenstadt | Published: 2020-01-30 | Updated: 2021-02-08

A4 : Evading Learning-based Adblockers

Authors: Shitong Zhu, Zhongjie Wang, Xun Chen, Shasha Li, Umar Iqbal, Zhiyun Qian, Kevin S. Chan, Srikanth V. Krishnamurthy, Zubair Shafiq | Published: 2020-01-29

Regularization Helps with Mitigating Poisoning Attacks: Distributionally-Robust Machine Learning Using the Wasserstein Distance

Authors: Farhad Farokhi | Published: 2020-01-29

Modelling and Quantifying Membership Information Leakage in Machine Learning

Authors: Farhad Farokhi, Mohamed Ali Kaafar | Published: 2020-01-29 | Updated: 2020-04-28

IoT Behavioral Monitoring via Network Traffic Analysis

Authors: Arunan Sivanathan | Published: 2020-01-28

Privacy-Preserving Gaussian Process Regression — A Modular Approach to the Application of Homomorphic Encryption

Authors: Peter Fenner, Edward O. Pyzer-Knapp | Published: 2020-01-28

Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis

Authors: William Briguglio, Sherif Saad | Published: 2020-01-27