Statistical and Machine Learning-based Decision Techniques for Physical Layer Authentication

Authors: Linda Senigagliesi, Marco Baldi, Ennio Gambi | Published: 2019-09-16

A Convolutional Transformation Network for Malware Classification

Authors: Duc-Ly Vu, Trong-Kha Nguyen, Tam V. Nguyen, Tu N. Nguyen, Fabio Massacci, Phu H. Phung | Published: 2019-09-16

VeriML: Enabling Integrity Assurances and Fair Payments for Machine Learning as a Service

Authors: Lingchen Zhao, Qian Wang, Cong Wang, Qi Li, Chao Shen, Xiaodong Lin, Shengshan Hu, Minxin Du | Published: 2019-09-16

Node Injection Attacks on Graphs via Reinforcement Learning

Authors: Yiwei Sun, Suhang Wang, Xianfeng Tang, Tsung-Yu Hsieh, Vasant Honavar | Published: 2019-09-14

White-Box Adversarial Defense via Self-Supervised Data Estimation

Authors: Zudi Lin, Hanspeter Pfister, Ziming Zhang | Published: 2019-09-13

Defending Against Adversarial Attacks by Suppressing the Largest Eigenvalue of Fisher Information Matrix

Authors: Chaomin Shen, Yaxin Peng, Guixu Zhang, Jinsong Fan | Published: 2019-09-13

On the Hardness of Robust Classification

Authors: Pascale Gourdeau, Varun Kanade, Marta Kwiatkowska, James Worrell | Published: 2019-09-12

Machine Learning in/for Blockchain: Future and Challenges

Authors: Fang Chen, Hong Wan, Hua Cai, Guang Cheng | Published: 2019-09-12 | Updated: 2020-12-08

An Empirical Investigation of Randomized Defenses against Adversarial Attacks

Authors: Yannik Potdevin, Dirk Nowotka, Vijay Ganesh | Published: 2019-09-12

Inspecting adversarial examples using the Fisher information

Authors: Jörg Martin, Clemens Elster | Published: 2019-09-12