MadNet: Using a MAD Optimization for Defending Against Adversarial Attacks

Authors: Shai Rozenberg, Gal Elidan, Ran El-Yaniv | Published: 2019-11-03 | Updated: 2020-06-12

Automatic Detection of Generated Text is Easiest when Humans are Fooled

Authors: Daphne Ippolito, Daniel Duckworth, Chris Callison-Burch, Douglas Eck | Published: 2019-11-02 | Updated: 2020-05-07

Operator and Manufacturer Independent D2D Private Link for Future 5G Networks

Authors: Ayoub Mars, Ahmad Abadleh, Wael Adi | Published: 2019-11-01

Privacy-Preserving Machine Learning Using EtC Images

Authors: Ayana Kawamura, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-11-01

Reducing audio membership inference attack accuracy to chance: 4 defenses

Authors: Michael Lomnitz, Nina Lopatina, Paul Gamble, Zigfried Hampel-Arias, Lucas Tindall, Felipe A. Mejia, Maria Alejandra Barrios | Published: 2019-10-31

Confident Learning: Estimating Uncertainty in Dataset Labels

Authors: Curtis G. Northcutt, Lu Jiang, Isaac L. Chuang | Published: 2019-10-31 | Updated: 2022-08-22

A machine-learning approach to Detect users’ suspicious behaviour through the Facebook wall

Authors: Aimilia Panagiotou, Bogdan Ghita, Stavros Shiaeles, Keltoum Bendiab | Published: 2019-10-31

Certifiable Robustness to Graph Perturbations

Authors: Aleksandar Bojchevski, Stephan Günnemann | Published: 2019-10-31 | Updated: 2019-12-19

A Unified Framework for Data Poisoning Attack to Graph-based Semi-supervised Learning

Authors: Xuanqing Liu, Si Si, Xiaojin Zhu, Yang Li, Cho-Jui Hsieh | Published: 2019-10-30

Investigating Resistance of Deep Learning-based IDS against Adversaries using min-max Optimization

Authors: Rana Abou Khamis, Omair Shafiq, Ashraf Matrawy | Published: 2019-10-30