Percival: Making In-Browser Perceptual Ad Blocking Practical With Deep Learning

Authors: Zain ul abi Din, Panagiotis Tigas, Samuel T. King, Benjamin Livshits | Published: 2019-05-17 | Updated: 2020-05-20

POPQORN: Quantifying Robustness of Recurrent Neural Networks

Authors: Ching-Yun Ko, Zhaoyang Lyu, Tsui-Wei Weng, Luca Daniel, Ngai Wong, Dahua Lin | Published: 2019-05-17

Simple Black-box Adversarial Attacks

Authors: Chuan Guo, Jacob R. Gardner, Yurong You, Andrew Gordon Wilson, Kilian Q. Weinberger | Published: 2019-05-17 | Updated: 2019-08-15

Online Multivariate Anomaly Detection and Localization for High-dimensional Settings

Authors: Mahsa Mozaffari, Yasin Yilmaz | Published: 2019-05-17 | Updated: 2020-07-14

Learning from Context: Exploiting and Interpreting File Path Information for Better Malware Detection

Authors: Adarsh Kyadige, Ethan M. Rudd, Konstantin Berlin | Published: 2019-05-16

Fooling Computer Vision into Inferring the Wrong Body Mass Index

Authors: Owen Levin, Zihang Meng, Vikas Singh, Xiaojin Zhu | Published: 2019-05-16

Spatial Positioning Token (SPToken) for Smart Mobility

Authors: Roman Overko, Rodrigo H. Ordonez-Hurtado, Sergiy Zhuk, Pietro Ferraro, Andrew Cullen, Robert Shorten | Published: 2019-05-16 | Updated: 2020-12-11

Parsimonious Black-Box Adversarial Attacks via Efficient Combinatorial Optimization

Authors: Seungyong Moon, Gaon An, Hyun Oh Song | Published: 2019-05-16 | Updated: 2022-10-18

Data Poisoning Attacks on Stochastic Bandits

Authors: Fang Liu, Ness Shroff | Published: 2019-05-16

On Norm-Agnostic Robustness of Adversarial Training

Authors: Bai Li, Changyou Chen, Wenlin Wang, Lawrence Carin | Published: 2019-05-15