Deep Learning Based Android Malware Detection Framework

Authors: Soumya Sourav, Devashish Khulbe, Naman Kapoor | Published: 2019-12-10

Training Provably Robust Models by Polyhedral Envelope Regularization

Authors: Chen Liu, Mathieu Salzmann, Sabine Süsstrunk | Published: 2019-12-10 | Updated: 2021-09-20

Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques

Authors: Ibrahim Yilmaz, Rahat Masum | Published: 2019-12-10

Stealing Knowledge from Protected Deep Neural Networks Using Composite Unlabeled Data

Authors: Itay Mosafi, Eli David, Nathan S. Netanyahu | Published: 2019-12-09

Machine Unlearning

Authors: Lucas Bourtoule, Varun Chandrasekaran, Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, Nicolas Papernot | Published: 2019-12-09 | Updated: 2020-12-15

Hardening Random Forest Cyber Detectors Against Adversarial Attacks

Authors: Giovanni Apruzzese, Mauro Andreolini, Michele Colajanni, Mirco Marchetti | Published: 2019-12-09

Detecting Cyberattacks in Industrial Control Systems Using Online Learning Algorithms

Authors: Guangxia Lia, Yulong Shena, Peilin Zhaob, Xiao Lu, Jia Liu, Yangyang Liu, Steven C. H. Hoi | Published: 2019-12-08

An Empirical Study on the Relation between Network Interpretability and Adversarial Robustness

Authors: Adam Noack, Isaac Ahern, Dejing Dou, Boyang Li | Published: 2019-12-07 | Updated: 2020-12-04

Principal Component Properties of Adversarial Samples

Authors: Malhar Jere, Sandro Herbig, Christine Lind, Farinaz Koushanfar | Published: 2019-12-07

An Empirical Study on the Intrinsic Privacy of SGD

Authors: Stephanie L. Hyland, Shruti Tople | Published: 2019-12-05 | Updated: 2022-02-28