NATTACK: Learning the Distributions of Adversarial Examples for an Improved Black-Box Attack on Deep Neural Networks

Authors: Yandong Li, Lijun Li, Liqiang Wang, Tong Zhang, Boqing Gong | Published: 2019-05-01 | Updated: 2019-12-09

To believe or not to believe: Validating explanation fidelity for dynamic malware analysis

Authors: Li Chen, Carter Yagemann, Evan Downing | Published: 2019-04-30

Detecting Adversarial Examples through Nonlinear Dimensionality Reduction

Authors: Francesco Crecchi, Davide Bacciu, Battista Biggio | Published: 2019-04-30 | Updated: 2019-05-01

Adversarial Training and Robustness for Multiple Perturbations

Authors: Florian Tramèr, Dan Boneh | Published: 2019-04-30 | Updated: 2019-10-18

Adversarial Training for Free!

Authors: Ali Shafahi, Mahyar Najibi, Amin Ghiasi, Zheng Xu, John Dickerson, Christoph Studer, Larry S. Davis, Gavin Taylor, Tom Goldstein | Published: 2019-04-29 | Updated: 2019-11-20

SEALion: a Framework for Neural Network Inference on Encrypted Data

Authors: Tim van Elsloo, Giorgio Patrini, Hamish Ivey-Law | Published: 2019-04-29

Deep pNML: Predictive Normalized Maximum Likelihood for Deep Neural Networks

Authors: Koby Bibas, Yaniv Fogel, Meir Feder | Published: 2019-04-28 | Updated: 2020-01-08

End-to-End Adversarial Learning for Intrusion Detection in Computer Networks

Authors: Bahram Mohammadi, Mohammad Sabokrou | Published: 2019-04-25

A Robust Approach for Securing Audio Classification Against Adversarial Attacks

Authors: Mohammad Esmaeilpour, Patrick Cardinal, Alessandro Lameiras Koerich | Published: 2019-04-24 | Updated: 2019-11-25

A Decade of Mal-Activity Reporting: A Retrospective Analysis of Internet Malicious Activity Blacklists

Authors: Benjamin Zi Hao Zhao, Muhammad Ikram, Hassan Jameel Asghar, Mohamed Ali Kaafar, Abdelberi Chaabane, Kanchana Thilakarathna | Published: 2019-04-24