The Secret Revealer: Generative Model-Inversion Attacks Against Deep Neural Networks

Authors: Yuheng Zhang, Ruoxi Jia, Hengzhi Pei, Wenxiao Wang, Bo Li, Dawn Song | Published: 2019-11-17 | Updated: 2020-04-18

Robust Anomaly Detection and Backdoor Attack Detection Via Differential Privacy

Authors: Min Du, Ruoxi Jia, Dawn Song | Published: 2019-11-16

Defending Against Model Stealing Attacks with Adaptive Misinformation

Authors: Sanjay Kariyappa, Moinuddin K Qureshi | Published: 2019-11-16

Suspicion-Free Adversarial Attacks on Clustering Algorithms

Authors: Anshuman Chhabra, Abhishek Roy, Prasant Mohapatra | Published: 2019-11-16

DomainGAN: Generating Adversarial Examples to Attack Domain Generation Algorithm Classifiers

Authors: Isaac Corley, Jonathan Lwowski, Justin Hoffman | Published: 2019-11-14 | Updated: 2020-02-14

There is Limited Correlation between Coverage and Robustness for Deep Neural Networks

Authors: Yizhen Dong, Peixin Zhang, Jingyi Wang, Shuang Liu, Jun Sun, Jianye Hao, Xinyu Wang, Li Wang, Jin Song Dong, Dai Ting | Published: 2019-11-14

Machine Learning Based Network Vulnerability Analysis of Industrial Internet of Things

Authors: Maede Zolanvari, Marcio A. Teixeira, Lav Gupta, Khaled M. Khan, Raj Jain | Published: 2019-11-13

Adversarial Examples in Modern Machine Learning: A Review

Authors: Rey Reza Wiyatno, Anqi Xu, Ousmane Dia, Archy de Berker | Published: 2019-11-13 | Updated: 2019-11-15

Eternal Sunshine of the Spotless Net: Selective Forgetting in Deep Networks

Authors: Aditya Golatkar, Alessandro Achille, Stefano Soatto | Published: 2019-11-12 | Updated: 2020-03-31

On Robustness to Adversarial Examples and Polynomial Optimization

Authors: Pranjal Awasthi, Abhratanu Dutta, Aravindan Vijayaraghavan | Published: 2019-11-12