An automated approach for task evaluation using EEG signals

Authors: Vishal Anand, S. R. Sreeja, Debasis Samanta | Published: 2019-11-07 | Updated: 2019-11-14

White-Box Target Attack for EEG-Based BCI Regression Problems

Authors: Lubin Meng, Chin-Teng Lin, Tzyy-Ring Jung, Dongrui Wu | Published: 2019-11-07

Fooling LIME and SHAP: Adversarial Attacks on Post hoc Explanation Methods

Authors: Dylan Slack, Sophie Hilgard, Emily Jia, Sameer Singh, Himabindu Lakkaraju | Published: 2019-11-06 | Updated: 2020-02-03

The Naked Sun: Malicious Cooperation Between Benign-Looking Processes

Authors: Fabio De Gaspari, Dorjan Hitaj, Giulio Pagnotta, Lorenzo De Carli, Luigi V. Mancini | Published: 2019-11-06

Secure Federated Submodel Learning

Authors: Chaoyue Niu, Fan Wu, Shaojie Tang, Lifeng Hua, Rongfei Jia, Chengfei Lv, Zhihua Wu, Guihai Chen | Published: 2019-11-06 | Updated: 2019-11-11

A Tale of Evil Twins: Adversarial Inputs versus Poisoned Models

Authors: Ren Pang, Hua Shen, Xinyang Zhang, Shouling Ji, Yevgeniy Vorobeychik, Xiapu Luo, Alex Liu, Ting Wang | Published: 2019-11-05 | Updated: 2020-11-21

Long-range Event-level Prediction and Response Simulation for Urban Crime and Global Terrorism with Granger Networks

Authors: Timmy Li, Yi Huang, James Evans, Ishanu Chattopadhyay | Published: 2019-11-04

Fast-UAP: An Algorithm for Speeding up Universal Adversarial Perturbation Generation with Orientation of Perturbation Vectors

Authors: Jiazhu Dai, Le Shu | Published: 2019-11-04 | Updated: 2020-01-06

Privacy for Free: Communication-Efficient Learning with Differential Privacy Using Sketches

Authors: Tian Li, Zaoxing Liu, Vyas Sekar, Virginia Smith | Published: 2019-11-03 | Updated: 2019-12-06

Online Robustness Training for Deep Reinforcement Learning

Authors: Marc Fischer, Matthew Mirman, Steven Stalder, Martin Vechev | Published: 2019-11-03 | Updated: 2019-11-22