Defeating Opaque Predicates Statically through Machine Learning and Binary Analysis

Authors: Ramtine Tofighi-Shirazi, Irina Asăvoae, Philippe Elbaz-Vincent, Thanh-Ha Le | Published: 2019-09-04

HinDom: A Robust Malicious Domain Detection System based on Heterogeneous Information Network with Transductive Classification

Authors: Xiaoqing Sun, Mingkai Tong, Jiahai Yang | Published: 2019-09-04

Privacy Accounting and Quality Control in the Sage Differentially Private ML Platform

Authors: Mathias Lecuyer, Riley Spahn, Kiran Vodrahalli, Roxana Geambasu, Daniel Hsu | Published: 2019-09-04 | Updated: 2019-09-06

Achieving Verified Robustness to Symbol Substitutions via Interval Bound Propagation

Authors: Po-Sen Huang, Robert Stanforth, Johannes Welbl, Chris Dyer, Dani Yogatama, Sven Gowal, Krishnamurthy Dvijotham, Pushmeet Kohli | Published: 2019-09-03 | Updated: 2019-12-20

High Accuracy and High Fidelity Extraction of Neural Networks

Authors: Matthew Jagielski, Nicholas Carlini, David Berthelot, Alex Kurakin, Nicolas Papernot | Published: 2019-09-03 | Updated: 2020-03-03

Metric Learning for Adversarial Robustness

Authors: Chengzhi Mao, Ziyuan Zhong, Junfeng Yang, Carl Vondrick, Baishakhi Ray | Published: 2019-09-03 | Updated: 2019-10-28

Detecting Covert Cryptomining using HPC

Authors: Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti | Published: 2019-08-31 | Updated: 2020-12-15

Your Smart Home Can’t Keep a Secret: Towards Automated Fingerprinting of IoT Traffic with Neural Networks

Authors: Shuaike Dong, Zhou Li, Di Tang, Jiongyi Chen, Menghan Sun, Kehuan Zhang | Published: 2019-08-31

IoT based Smart Access Controlled Secure Smart City Architecture Using Blockchain

Authors: Rourab Paul, Nimisha Ghosh, Suman Sau, Amlan Chakrabarti, Prasant Mahapatra | Published: 2019-08-30 | Updated: 2019-09-09

Universal, transferable and targeted adversarial attacks

Authors: Junde Wu, Rao Fu | Published: 2019-08-29 | Updated: 2022-06-13