L0 Regularization Based Neural Network Design and Compression

Authors: S. Asim Ahmed | Published: 2019-05-31

Reverse KL-Divergence Training of Prior Networks: Improved Uncertainty and Adversarial Robustness

Authors: Andrey Malinin, Mark Gales | Published: 2019-05-31 | Updated: 2019-12-02

Privacy-Preserving Detection of IoT Devices Connected Behind a NAT in a Smart Home Setup

Authors: Yair Meidan, Vinay Sachidananda, Yuval Elovici, Asaf Shabtai | Published: 2019-05-31

Bypassing Backdoor Detection Algorithms in Deep Learning

Authors: Te Juin Lester Tan, Reza Shokri | Published: 2019-05-31 | Updated: 2020-06-06

Identifying Classes Susceptible to Adversarial Attacks

Authors: Rangeet Pan, Md Johirul Islam, Shibbir Ahmed, Hridesh Rajan | Published: 2019-05-30

Speaker Anonymization Using X-vector and Neural Waveform Models

Authors: Fuming Fang, Xin Wang, Junichi Yamagishi, Isao Echizen, Massimiliano Todisco, Nicholas Evans, Jean-Francois Bonastre | Published: 2019-05-30

Bandlimiting Neural Networks Against Adversarial Attacks

Authors: Yuping Lin, Kasra Ahmadi K. A., Hui Jiang | Published: 2019-05-30

Quantifying the Privacy Risks of Learning High-Dimensional Graphical Models

Authors: Sasi Kumar Murakonda, Reza Shokri, George Theodorakopoulos | Published: 2019-05-29 | Updated: 2021-02-17

Securing Connected & Autonomous Vehicles: Challenges Posed by Adversarial Machine Learning and The Way Forward

Authors: Adnan Qayyum, Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2019-05-29

Zeroth-Order Stochastic Alternating Direction Method of Multipliers for Nonconvex Nonsmooth Optimization

Authors: Feihu Huang, Shangqian Gao, Songcan Chen, Heng Huang | Published: 2019-05-29 | Updated: 2019-07-30