IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain

Authors: Rourab Paul, Nimisha Ghosh, Suman Sau, Amlan Chakrabarti, Prasant Mahapatra | Published: 2019-08-30 | Updated: 2019-09-09

Universal, transferable and targeted adversarial attacks

Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13

White-box vs Black-box: Bayes Optimal Strategies for Membership Inference

Authors: Alexandre Sablayrolles, Matthijs Douze, Yann Ollivier, Cordelia Schmid, Hervé Jégou | Published: 2019-08-29

Deep Neural Network Ensembles against Deception: Ensemble Diversity, Accuracy and Robustness

Authors: Ling Liu, Wenqi Wei, Ka-Ho Chow, Margaret Loper, Emre Gursoy, Stacey Truex, Yanzhao Wu | Published: 2019-08-29

HTMLPhish: Enabling Phishing Web Page Detection by Applying Deep Learning Techniques on HTML Analysis

Authors: Chidimma Opara, Bo Wei, Yingke Chen | Published: 2019-08-28 | Updated: 2020-05-15

Fairness-Aware Process Mining

Authors: Mahnaz Sadat Qafari, Wil van der Aalst | Published: 2019-08-28

On Inferring Training Data Attributes in Machine Learning Models

Authors: Benjamin Zi Hao Zhao, Hassan Jameel Asghar, Raghav Bhaskar, Mohamed Ali Kaafar | Published: 2019-08-28 | Updated: 2019-10-12

Rényi Differential Privacy of the Sampled Gaussian Mechanism

Authors: Ilya Mironov, Kunal Talwar, Li Zhang | Published: 2019-08-28

Detection of Backdoors in Trained Classifiers Without Access to the Training Set

Authors: Zhen Xiang, David J. Miller, George Kesidis | Published: 2019-08-27 | Updated: 2020-08-19

Key Protected Classification for Collaborative Learning

Authors: Mert Bülent Sarıyıldız, Ramazan Gökberk Cinbiş, Erman Ayday | Published: 2019-08-27 | Updated: 2020-04-22