Dynamic data fusion using multi-input models for malware classification

Authors: Viktor Zenkov, Jason Laska | Published: 2019-09-21

Challenges of Privacy-Preserving Machine Learning in IoT

Authors: Mengyao Zheng, Dixing Xu, Linshan Jiang, Chaojie Gu, Rui Tan, Peng Cheng | Published: 2019-09-21

COPYCAT: Practical Adversarial Attacks on Visualization-Based Malware Detection

Authors: Aminollah Khormali, Ahmed Abusnaina, Songqing Chen, DaeHun Nyang, Aziz Mohaisen | Published: 2019-09-20

Defending Against Physically Realizable Attacks on Image Classification

Authors: Tong Wu, Liang Tong, Yevgeniy Vorobeychik | Published: 2019-09-20 | Updated: 2020-02-14

Towards Federated Graph Learning for Collaborative Financial Crimes Detection

Authors: Toyotaro Suzumura, Yi Zhou, Natahalie Baracaldo, Guangnan Ye, Keith Houck, Ryo Kawahara, Ali Anwar, Lucia Larise Stavarache, Yuji Watanabe, Pablo Loyola, Daniel Klyashtorny, Heiko Ludwig, Kumar Bhaskaran | Published: 2019-09-19 | Updated: 2019-10-02

Synthesis of Realistic ECG using Generative Adversarial Networks

Authors: Anne Marie Delaney, Eoin Brophy, Tomas E. Ward | Published: 2019-09-19

Adversarial Vulnerability Bounds for Gaussian Process Classification

Authors: Michael Thomas Smith, Kathrin Grosse, Michael Backes, Mauricio A Alvarez | Published: 2019-09-19

Differentially Private Regression and Classification with Sparse Gaussian Processes

Authors: Michael Thomas Smith, Mauricio A. Alvarez, Neil D. Lawrence | Published: 2019-09-19

Absum: Simple Regularization Method for Reducing Structural Sensitivity of Convolutional Neural Networks

Authors: Sekitoshi Kanai, Yasutoshi Ida, Yasuhiro Fujiwara, Masanori Yamada, Shuichi Adachi | Published: 2019-09-19

Non-Interactive Private Decision Tree Evaluation

Authors: Anselme Tueno, Yordan Boev, Florian Kerschbaum | Published: 2019-09-18