Adversarial Vulnerability Bounds for Gaussian Process Classification

Authors: Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A Alvarez | Published: 2019-09-19

Differentially Private Regression and Classification with Sparse Gaussian Processes

Authors: Michael Thomas Smith, Mauricio A. Alvarez, Neil D. Lawrence | Published: 2019-09-19

Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks

Authors: Sekitoshi Kanai, Yasutoshi Ida, Yasuhiro Fujiwara, Masanori Yamada, Shuichi Adachi | Published: 2019-09-19

Non-Interactive Private Decision Tree Evaluation

Authors: Anselme Tueno, Yordan Boev, Florian Kerschbaum | Published: 2019-09-18

Adversarial Attacks and Defenses in Images, Graphs and Text: A Review

Authors: Han Xu, Yao Ma, Haochen Liu, Debayan Deb, Hui Liu, Jiliang Tang, Anil K. Jain | Published: 2019-09-17 | Updated: 2019-10-09

Enterprise API Security and GDPR Compliance: Design and Implementation Perspective

Authors: Fatima Hussain, Rasheed Hussain, Brett Noye, Salah Sharieh | Published: 2019-09-17

Machine Learning based IoT Edge Node Security Attack and Countermeasures

Authors: Vishalini R. Laguduva, Sheikh Ariful Islam, Sathyanarayanan Aakur, Srinivas Katkoori, Robert Karam | Published: 2019-09-17

Defending against Machine Learning based Inference Attacks via Adversarial Examples: Opportunities and Challenges

Authors: Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-09-17 | Updated: 2019-09-19

Network entity characterization and attack prediction

Authors: Vaclav Bartos, Martin Zadnik, Sheikh Mahbub Habib, Emmanouil Vasilomanolakis | Published: 2019-09-17

They Might NOT Be Giants: Crafting Black-Box Adversarial Examples with Fewer Queries Using Particle Swarm Optimization

Authors: Rayan Mosli, Matthew Wright, Bo Yuan, Yin Pan | Published: 2019-09-16