Recovering Localized Adversarial Attacks

Authors: Jan Philip Göpfert, Heiko Wersing, Barbara Hammer | Published: 2019-10-21

Leveraging Hierarchical Representations for Preserving Privacy and Utility in Text

Authors: Oluwaseyi Feyisetan, Tom Diethe, Thomas Drake | Published: 2019-10-20

Tree-based Intelligent Intrusion Detection System in Internet of Vehicles

Authors: Li Yang, Abdallah Moubayed, Ismail Hamieh, Abdallah Shami | Published: 2019-10-18 | Updated: 2022-10-05

A Fast Saddle-Point Dynamical System Approach to Robust Deep Learning

Authors: Yasaman Esfandiari, Aditya Balu, Keivan Ebrahimi, Umesh Vaidya, Nicola Elia, Soumik Sarkar | Published: 2019-10-18 | Updated: 2021-03-01

Federated Generative Privacy

Authors: Aleksei Triastcyn, Boi Faltings | Published: 2019-10-18

Enforcing Linearity in DNN succours Robustness and Adversarial Image Generation

Authors: Anindya Sarkar, Nikhil Kumar Gupta, Raghu Iyengar | Published: 2019-10-17 | Updated: 2019-10-21

Mapper Based Classifier

Authors: Jacek Cyranka, Alexander Georges, David Meyer | Published: 2019-10-17 | Updated: 2019-10-21

Instance adaptive adversarial training: Improved accuracy tradeoffs in neural nets

Authors: Yogesh Balaji, Tom Goldstein, Judy Hoffman | Published: 2019-10-17

Heterogeneous Graph Matching Networks

Authors: Shen Wang, Zhengzhang Chen, Xiao Yu, Ding Li, Jingchao Ni, Lu-An Tang, Jiaping Gui, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-10-17

A New Defense Against Adversarial Images: Turning a Weakness into a Strength

Authors: Tao Yu, Shengyuan Hu, Chuan Guo, Wei-Lun Chao, Kilian Q. Weinberger | Published: 2019-10-16 | Updated: 2019-12-04