A Note on Our Submission to Track 4 of iDASH 2019

Authors: Marcel Keller, Ke Sun | Published: 2019-10-24

Malware Classification using Deep Learning based Feature Extraction and Wrapper based Feature Selection Technique

Authors: Muhammad Furqan Rafique, Muhammad Ali, Aqsa Saeed Qureshi, Asifullah Khan, Anwar Majid Mirza | Published: 2019-10-24 | Updated: 2020-12-26

An Adaptive Empirical Bayesian Method for Sparse Deep Learning

Authors: Wei Deng, Xiao Zhang, Faming Liang, Guang Lin | Published: 2019-10-23 | Updated: 2020-04-13

Wasserstein Smoothing: Certified Robustness against Wasserstein Adversarial Attacks

Authors: Alexander Levine, Soheil Feizi | Published: 2019-10-23

A Useful Taxonomy for Adversarial Robustness of Neural Networks

Authors: Leslie N. Smith | Published: 2019-10-23

ASNM Datasets: A Collection of Network Traffic Features for Testing of Adversarial Classifiers and Network Intrusion Detectors

Authors: Ivan Homoliak, Petr Hanacek | Published: 2019-10-23

A Context-aware Framework for Detecting Sensor-based Threats on Smart Devices

Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2019-10-22

Cross-Representation Transferability of Adversarial Attacks: From Spectrograms to Audio Waveforms

Authors: Karl Michel Koerich, Mohammad Esmaeilpour, Sajjad Abdoli, Alceu de Souza Britto Jr., Alessandro Lameiras Koerich | Published: 2019-10-22 | Updated: 2020-07-29

Adversarial Example Detection by Classification for Deep Speech Recognition

Authors: Saeid Samizade, Zheng-Hua Tan, Chao Shen, Xiaohong Guan | Published: 2019-10-22

Abnormal Client Behavior Detection in Federated Learning

Authors: Suyi Li, Yong Cheng, Yang Liu, Wei Wang, Tianjian Chen | Published: 2019-10-22 | Updated: 2019-12-06