Neutaint: Efficient Dynamic Taint Analysis with Neural Networks

Authors: Dongdong She, Yizheng Chen, Abhishek Shah, Baishakhi Ray, Suman Jana | Published: 2019-07-08 | Updated: 2019-09-03

Optimal Explanations of Linear Models

Authors: Dimitris Bertsimas, Arthur Delarue, Patrick Jaillet, Sebastien Martin | Published: 2019-07-08

The Price of Interpretability

Authors: Dimitris Bertsimas, Arthur Delarue, Patrick Jaillet, Sebastien Martin | Published: 2019-07-08

Privacy-Preserving Classification with Secret Vector Machines

Authors: Valentin Hartmann, Konark Modi, Josep M. Pujol, Robert West | Published: 2019-07-08 | Updated: 2020-08-19

QUOTIENT: Two-Party Secure Neural Network Training and Prediction

Authors: Nitin Agrawal, Ali Shahin Shamsabadi, Matt J. Kusner, Adrià Gascón | Published: 2019-07-08

Smart Grid Cyber Attacks Detection using Supervised Learning and Heuristic Feature Selection

Authors: Jacob Sakhnini, Hadis Karimipour, Ali Dehghantanha | Published: 2019-07-07

Intelligent Systems Design for Malware Classification Under Adversarial Conditions

Authors: Sean M. Devine, Nathaniel D. Bastian | Published: 2019-07-06

Detecting and Diagnosing Adversarial Images with Class-Conditional Capsule Reconstructions

Authors: Yao Qin, Nicholas Frosst, Sara Sabour, Colin Raffel, Garrison Cottrell, Geoffrey Hinton | Published: 2019-07-05 | Updated: 2020-02-18

Adversarial Robustness through Local Linearization

Authors: Chongli Qin, James Martens, Sven Gowal, Dilip Krishnan, Krishnamurthy Dvijotham, Alhussein Fawzi, Soham De, Robert Stanforth, Pushmeet Kohli | Published: 2019-07-04 | Updated: 2019-10-10

Diffprivlib: The IBM Differential Privacy Library

Authors: Naoise Holohan, Stefano Braghin, Pól Mac Aonghusa, Killian Levacher | Published: 2019-07-04