Malware Makeover: Breaking ML-based Static Analysis by Modifying Executable Bytes

Authors: Keane Lucas, Mahmood Sharif, Lujo Bauer, Michael K. Reiter, Saurabh Shintre | Published: 2019-12-19 | Updated: 2021-10-25

Model Weight Theft With Just Noise Inputs: The Curious Case of the Petulant Attacker

Authors: Nicholas Roberts, Vinay Uday Prabhu, Matthew McAteer | Published: 2019-12-19

Adversarial VC-dimension and Sample Complexity of Neural Networks

Authors: Zetong Qi, T. J. Wilder | Published: 2019-12-18

SIGMA : Strengthening IDS with GAN and Metaheuristics Attacks

Authors: Simon Msika, Alejandro Quintero, Foutse Khomh | Published: 2019-12-18

Learning to Prevent Leakage: Privacy-Preserving Inference in the Mobile Cloud

Authors: Shuang Zhang, Liyao Xiang, Congcong Li, Yixuan Wang, Quanshi Zhang, Wei Wang, Bo Li | Published: 2019-12-18 | Updated: 2021-06-15

MimicGAN: Robust Projection onto Image Manifolds with Corruption Mimicking

Authors: Rushil Anirudh, Jayaraman J. Thiagarajan, Bhavya Kailkhura, Timo Bremer | Published: 2019-12-16 | Updated: 2020-04-30

Adversarial Model Extraction on Graph Neural Networks

Authors: David DeFazio, Arti Ramesh | Published: 2019-12-16

Constructing a provably adversarially-robust classifier from a high accuracy one

Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2019-12-16

DAmageNet: A Universal Adversarial Dataset

Authors: Sizhe Chen, Xiaolin Huang, Zhengbao He, Chengjin Sun | Published: 2019-12-16

Pseudo Random Number Generation: a Reinforcement Learning approach

Authors: Luca Pasqualini, Maurizio Parton | Published: 2019-12-15