BOSH: An Efficient Meta Algorithm for Decision-based Attacks

Authors: Zhenxin Xiao, Puyudi Yang, Yuchen Jiang, Kai-Wei Chang, Cho-Jui Hsieh | Published: 2019-09-10 | Updated: 2019-10-14

Adversarial Robustness Against the Union of Multiple Perturbation Models

Authors: Pratyush Maini, Eric Wong, J. Zico Kolter | Published: 2019-09-09 | Updated: 2020-07-28

GAN-Leaks: A Taxonomy of Membership Inference Attacks against Generative Models

Authors: Dingfan Chen, Ning Yu, Yang Zhang, Mario Fritz | Published: 2019-09-09 | Updated: 2020-11-23

Devign: Effective Vulnerability Identification by Learning Comprehensive Program Semantics via Graph Neural Networks

Authors: Yaqin Zhou, Shangqing Liu, Jingkai Siow, Xiaoning Du, Yang Liu | Published: 2019-09-08

When Explainability Meets Adversarial Learning: Detecting Adversarial Examples using SHAP Signatures

Authors: Gil Fidel, Ron Bitton, Asaf Shabtai | Published: 2019-09-08

On the Need for Topology-Aware Generative Models for Manifold-Based Defenses

Authors: Uyeong Jang, Susmit Jha, Somesh Jha | Published: 2019-09-07 | Updated: 2020-02-17

Distributed creation of Machine learning agents for Blockchain analysis

Authors: Zvezdin Besarabov, Todor Kolev | Published: 2019-09-06

Blackbox Attacks on Reinforcement Learning Agents Using Approximated Temporal Information

Authors: Yiren Zhao, Ilia Shumailov, Han Cui, Xitong Gao, Robert Mullins, Ross Anderson | Published: 2019-09-06 | Updated: 2019-11-21

Spatiotemporally Constrained Action Space Attacks on Deep Reinforcement Learning Agents

Authors: Xian Yeow Lee, Sambit Ghadai, Kai Liang Tan, Chinmay Hegde, Soumik Sarkar | Published: 2019-09-05 | Updated: 2019-11-19

Duet: An Expressive Higher-order Language and Linear Type System for Statically Enforcing Differential Privacy

Authors: Joseph P. Near, David Darais, Chike Abuah, Tim Stevens, Pranav Gaddamadugu, Lun Wang, Neel Somani, Mu Zhang, Nikhil Sharma, Alex Shan, Dawn Song | Published: 2019-09-05