Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection

Authors: Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha | Published: 2019-07-07

Intelligent Systems Design for Malware Classification Under Adversarial Conditions

Authors: Sean M. Devine, Nathaniel D. Bastian | Published: 2019-07-06

Detecting and Diagnosing Adversarial Images with Class-Conditional Capsule Reconstructions

Authors: Yao Qin, Nicholas Frosst, Sara Sabour, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2019-07-05 | Updated: 2020-02-18

Adversarial Robustness through Local Linearization

Authors: Chongli Qin, James Martens, Sven Gowal, Dilip Krishnan, Krishnamurthy Dvijotham, Alhussein Fawzi, Soham De, Robert Stanforth, Pushmeet Kohli | Published: 2019-07-04 | Updated: 2019-10-10

Diffprivlib: The IBM Differential Privacy Library

Authors: Naoise Holohan, Stefano Braghin, Pól Mac Aonghusa, Killian Levacher | Published: 2019-07-04

Capacity Bounded Differential Privacy

Authors: Kamalika Chaudhuri, Jacob Imola, Ashwin Machanavajjhala | Published: 2019-07-03

Minimally distorted Adversarial Examples with a Fast Adaptive Boundary Attack

Authors: Francesco Croce, Matthias Hein | Published: 2019-07-03 | Updated: 2020-07-20

A Bayesian Hierarchical Model for Criminal Investigations

Authors: F. O. Bunnin, J. Q. Smith | Published: 2019-07-03 | Updated: 2019-11-05

Gathering Cyber Threat Intelligence from Twitter Using Novelty Classification

Authors: Ba Dung Le, Guanhua Wang, Mehwish Nasim, Ali Babar | Published: 2019-07-03 | Updated: 2019-09-05

MimosaNet: An Unrobust Neural Network Preventing Model Stealing

Authors: Kálmán Szentannai, Jalal Al-Afandi, András Horváth | Published: 2019-07-02