Detecting Covert Cryptomining using HPC

Authors: Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti | Published: 2019-08-31 | Updated: 2020-12-15

Your Smart Home Can’t Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks

Authors: Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang | Published: 2019-08-31

IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain

Authors: Rourab Paul, Nimisha Ghosh, Suman Sau, Amlan Chakrabarti, Prasant Mahapatra | Published: 2019-08-30 | Updated: 2019-09-09

Universal, transferable and targeted adversarial attacks

Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13

White-box vs Black-box: Bayes Optimal Strategies for Membership Inference

Authors: Alexandre Sablayrolles, Matthijs Douze, Yann Ollivier, Cordelia Schmid, Hervé Jégou | Published: 2019-08-29

Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness

Authors: Ling Liu, Wenqi Wei, Ka-Ho Chow, Margaret Loper, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-08-29

HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis

Authors: Chidimma Opara, Bo Wei, Yingke Chen | Published: 2019-08-28 | Updated: 2020-05-15

Fairness-Aware Process Mining

Authors: Mahnaz Sadat Qafari, Wil van der Aalst | Published: 2019-08-28

On Inferring Training Data Attributes in Machine Learning Models

Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar | Published: 2019-08-28 | Updated: 2019-10-12

Rényi Differential Privacy of the Sampled Gaussian Mechanism

Authors: Ilya Mironov, Kunal Talwar, Li Zhang | Published: 2019-08-28