Adversarial Sensor Attack on LiDAR-based Perception in Autonomous Driving

Authors: Yulong Cao, Chaowei Xiao, Benjamin Cyr, Yimeng Zhou, Won Park, Sara Rampazzi, Qi Alfred Chen, Kevin Fu, Z. Morley Mao | Published: 2019-07-16 | Updated: 2019-08-20

Graph Interpolating Activation Improves Both Natural and Robust Accuracies in Data-Efficient Deep Learning

Authors: Bao Wang, Stanley J. Osher | Published: 2019-07-16

Recovery Guarantees for Compressible Signals with Adversarial Noise

Authors: Jasjeet Dhaliwal, Kyle Hambrook | Published: 2019-07-15 | Updated: 2019-08-07

Measuring the Transferability of Adversarial Examples

Authors: Deyan Petrov, Timothy M. Hospedales | Published: 2019-07-14

Motion Sensor-based Privacy Attack on Smartphones

Authors: S Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen | Published: 2019-07-12 | Updated: 2020-10-19

A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams

Authors: Avishek Bose, Vahid Behzadan, Carlos Aguirre, William H. Hsu | Published: 2019-07-12

Stateful Detection of Black-Box Adversarial Attacks

Authors: Steven Chen, Nicholas Carlini, David Wagner | Published: 2019-07-12

Adversarial Objects Against LiDAR-Based Autonomous Driving Systems

Authors: Yulong Cao, Chaowei Xiao, Dawei Yang, Jing Fang, Ruigang Yang, Mingyan Liu, Bo Li | Published: 2019-07-11

Conditional Analysis for Key-Value Data with Local Differential Privacy

Authors: Lin Sun, Jun Zhao, Xiaojun Ye, Shuo Feng, Teng Wang, Tao Bai | Published: 2019-07-11

Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn

Authors: Ziv Katzir, Yuval Elovici | Published: 2019-07-11