On the Connection Between Adversarial Robustness and Saliency Map Interpretability

Authors: Christian Etmann, Sebastian Lunz, Peter Maass, Carola-Bibiane Schönlieb | Published: 2019-05-10

Adversarial Defense Framework for Graph Neural Network

Authors: Shen Wang, Zhengzhang Chen, Jingchao Ni, Xiao Yu, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-05-09 | Updated: 2019-05-10

Bidirectional RNN-based Few-shot Training for Detecting Multi-stage Attack

Authors: Di Zhao, Jiqiang Liu, Jialin Wang, Wenjia Niu, Endong Tong, Tong Chen, Gang Li | Published: 2019-05-09

Adversarial Image Translation: Unrestricted Adversarial Examples in Face Recognition Systems

Authors: Kazuya Kakizaki, Kosuke Yoshida | Published: 2019-05-09 | Updated: 2020-01-28

Reconstruction of Privacy-Sensitive Data from Protected Templates

Authors: Shideh Rezaeifar, Behrooz Razeghi, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-08

Adaptive Generation of Unrestricted Adversarial Inputs

Authors: Isaac Dunn, Hadrien Pouget, Tom Melham, Daniel Kroening | Published: 2019-05-07 | Updated: 2019-10-01

Machine Learning Cryptanalysis of a Quantum Random Number Generator

Authors: Nhan Duy Truong, Jing Yan Haw, Syed Muhamad Assad, Ping Koy Lam, Omid Kavehei | Published: 2019-05-07 | Updated: 2019-05-13

Adversarial Examples Are Not Bugs, They Are Features

Authors: Andrew Ilyas, Shibani Santurkar, Dimitris Tsipras, Logan Engstrom, Brandon Tran, Aleksander Madry | Published: 2019-05-06 | Updated: 2019-08-12

Cognitive Triaging of Phishing Attacks

Authors: Amber van der Heijden, Luca Allodi | Published: 2019-05-06 | Updated: 2019-05-29

Privacy-Preserving Deep Neural Networks with Pixel-based Image Encryption Considering Data Augmentation in the Encrypted Domain

Authors: Warit Sirichotedumrong, Takahiro Maekawa, Yuma Kinoshita, Hitoshi Kiya | Published: 2019-05-06