Measuring Bias in Contextualized Word Representations

Authors: Keita Kurita, Nidhi Vyas, Ayush Pareek, Alan W Black, Yulia Tsvetkov | Published: 2019-06-18

Improving Black-box Adversarial Attacks with a Transfer-based Prior

Authors: Shuyu Cheng, Yinpeng Dong, Tianyu Pang, Hang Su, Jun Zhu | Published: 2019-06-17 | Updated: 2020-07-26

Membership Privacy for Machine Learning Models Through Knowledge Transfer

Authors: Virat Shejwalkar, Amir Houmansadr | Published: 2019-06-15 | Updated: 2020-12-31

Real-Time Privacy-Preserving Data Release for Smart Meters

Authors: Mohammadhadi Shateri, Francisco Messina, Pablo Piantanida, Fabrice Labeau | Published: 2019-06-14 | Updated: 2021-11-25

Towards Stable and Efficient Training of Verifiably Robust Neural Networks

Authors: Huan Zhang, Hongge Chen, Chaowei Xiao, Sven Gowal, Robert Stanforth, Bo Li, Duane Boning, Cho-Jui Hsieh | Published: 2019-06-14 | Updated: 2019-11-27

Copy and Paste: A Simple But Effective Initialization Method for Black-Box Adversarial Attacks

Authors: Thomas Brunner, Frederik Diehl, Alois Knoll | Published: 2019-06-14 | Updated: 2019-12-29

Adversarial Robustness Assessment: Why both $L_0$ and $L_\infty$ Attacks Are Necessary

Authors: Shashank Kotyan, Danilo Vasconcellos Vargas | Published: 2019-06-14 | Updated: 2020-07-16

A Review of Machine Learning Applications in Fuzzing

Authors: Gary J Saavedra, Kathryn N Rodhouse, Daniel M Dunlavy, Philip W Kegelmeyer | Published: 2019-06-13 | Updated: 2019-10-09

Deep Reinforcement Learning for Cyber Security

Authors: Thanh Thi Nguyen, Vijay Janapa Reddi | Published: 2019-06-13 | Updated: 2021-11-02

Evolutionary Trigger Set Generation for DNN Black-Box Watermarking

Authors: Jia Guo, Miodrag Potkonjak | Published: 2019-06-11 | Updated: 2021-02-14