Measuring the Transferability of Adversarial Examples

Authors: Deyan Petrov, Timothy M. Hospedales | Published: 2019-07-14

Motion Sensor-based Privacy Attack on Smartphones

Authors: S Abhishek Anand, Chen Wang, Jian Liu, Nitesh Saxena, Yingying Chen | Published: 2019-07-12 | Updated: 2020-10-19

A Novel Approach for Detection and Ranking of Trendy and Emerging Cyber Threat Events in Twitter Streams

Authors: Avishek Bose, Vahid Behzadan, Carlos Aguirre, William H. Hsu | Published: 2019-07-12

Stateful Detection of Black-Box Adversarial Attacks

Authors: Steven Chen, Nicholas Carlini, David Wagner | Published: 2019-07-12

Adversarial Objects Against LiDAR-Based Autonomous Driving Systems

Authors: Yulong Cao, Chaowei Xiao, Dawei Yang, Jing Fang, Ruigang Yang, Mingyan Liu, Bo Li | Published: 2019-07-11

Conditional Analysis for Key-Value Data with Local Differential Privacy

Authors: Lin Sun, Jun Zhao, Xiaojun Ye, Shuo Feng, Teng Wang, Tao Bai | Published: 2019-07-11

Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn

Authors: Ziv Katzir, Yuval Elovici | Published: 2019-07-11

Making AI Forget You: Data Deletion in Machine Learning

Authors: Antonio Ginart, Melody Y. Guan, Gregory Valiant, James Zou | Published: 2019-07-11 | Updated: 2019-11-04

On Designing Machine Learning Models for Malicious Network Traffic Classification

Authors: Talha Ongun, Timothy Sakharaov, Simona Boboila, Alina Oprea, Tina Eliassi-Rad | Published: 2019-07-10

Application Inference using Machine Learning based Side Channel Analysis

Authors: Nikhil Chawla, Arvind Singh, Monodeep Kar, Saibal Mukhopadhyay | Published: 2019-07-09