Sign-OPT: A Query-Efficient Hard-label Adversarial Attack

Authors: Minhao Cheng, Simranjit Singh, Patrick Chen, Pin-Yu Chen, Sijia Liu, Cho-Jui Hsieh | Published: 2019-09-24 | Updated: 2020-02-14

HealthGuard: A Machine Learning-Based Security Framework for Smart Healthcare Systems

Authors: AKM Iqtidar Newaz, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2019-09-23

Multi-task Learning and Catastrophic Forgetting in Continual Reinforcement Learning

Authors: João Ribeiro, Francisco S. Melo, João Dias | Published: 2019-09-22

Techniques and Applications for Crawling, Ingesting and Analyzing Blockchain Data

Authors: Evan Brinckman, Andrey Kuehlkamp, Jarek Nabrzyski, Ian J. Taylor | Published: 2019-09-22

Dynamic data fusion using multi-input models for malware classification

Authors: Viktor Zenkov, Jason Laska | Published: 2019-09-21

Challenges of Privacy-Preserving Machine Learning in IoT

Authors: Mengyao Zheng, Dixing Xu, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng | Published: 2019-09-21

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Authors: Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen | Published: 2019-09-20

Defending Against Physically Realizable Attacks on Image Classification

Authors: Tong Wu, Liang Tong, Yevgeniy Vorobeychik | Published: 2019-09-20 | Updated: 2020-02-14

Towards Federated Graph Learning for Collaborative Financial Crimes Detection

Authors: Toyotaro Suzumura, Yi Zhou, Natahalie Baracaldo, Guangnan Ye, Keith Houck, Ryo Kawahara, Ali Anwar, Lucia Larise Stavarache, Yuji Watanabe, Pablo Loyola, Daniel Klyashtorny, Heiko Ludwig, Kumar Bhaskaran | Published: 2019-09-19 | Updated: 2019-10-02

Synthesis of Realistic ECG using Generative Adversarial Networks

Authors: Anne Marie Delaney, Eoin Brophy, Tomas E. Ward | Published: 2019-09-19