MUTE: Data-Similarity Driven Multi-hot Target Encoding for Neural Network Design

Authors: Mayoore S. Jaiswal, Bumsoo Kang, Jinho Lee, Minsik Cho | Published: 2019-10-15

ODE guided Neural Data Augmentation Techniques for Time Series Data and its Benefits on Robustness

Authors: Anindya Sarkar, Anirudh Sunder Raj, Raghu Sesha Iyengar | Published: 2019-10-15 | Updated: 2020-09-27

Cascading Machine Learning to Attack Bitcoin Anonymity

Authors: Francesco Zola, Maria Eguimendia, Jan Lukas Bruse, Raul Orduna Urrutia | Published: 2019-10-15

ZO-AdaMM: Zeroth-Order Adaptive Momentum Method for Black-Box Optimization

Authors: Xiangyi Chen, Sijia Liu, Kaidi Xu, Xingguo Li, Xue Lin, Mingyi Hong, David Cox | Published: 2019-10-15 | Updated: 2019-10-16

Automated Ransomware Behavior Analysis: Pattern Extraction and Early Detection

Authors: Qian Chen, Sheikh Rabiul Islam, Henry Haswell, Robert A. Bridges | Published: 2019-10-15

SCAFFOLD: Stochastic Controlled Averaging for Federated Learning

Authors: Sai Praneeth Karimireddy, Satyen Kale, Mehryar Mohri, Sashank J. Reddi, Sebastian U. Stich, Ananda Theertha Suresh | Published: 2019-10-14 | Updated: 2021-04-09

Using Lexical Features for Malicious URL Detection — A Machine Learning Approach

Authors: Apoorva Joshi, Levi Lloyd, Paul Westin, Srini Seethapathy | Published: 2019-10-14

Using AI/ML to gain situational understanding from passive network observations

Authors: D. Verma, S. Calo | Published: 2019-10-14

Confidence-Calibrated Adversarial Training: Generalizing to Unseen Attacks

Authors: David Stutz, Matthias Hein, Bernt Schiele | Published: 2019-10-14 | Updated: 2020-06-30

Comment on “AndrODet: An adaptive Android obfuscation detector”

Authors: Alireza Mohammadinodooshan, Ulf Kargén, Nahid Shahmehri | Published: 2019-10-14 | Updated: 2020-01-18