Multiple perspectives HMM-based feature engineering for credit card fraud detection

Authors: Yvan Lucas, Pierre-Edouard Portier, Léa Laporte, Olivier Caelen, Liyun He-Guelton, Sylvie Calabretto, Michael Granitzer | Published: 2019-05-15

Modern Problems Require Modern Solutions: Hybrid Concepts for Industrial Intrusion Detection

Authors: Simon D. Duque Anton, Mathias Strufe, Hans Dieter Schotten | Published: 2019-05-15 | Updated: 2019-05-16

Transferable Clean-Label Poisoning Attacks on Deep Neural Nets

Authors: Chen Zhu, W. Ronny Huang, Ali Shafahi, Hengduo Li, Gavin Taylor, Christoph Studer, Tom Goldstein | Published: 2019-05-15 | Updated: 2019-05-16

Network Attacks Anomaly Detection Using SNMP MIB Interface Parameters

Authors: Ghazi Al-Naymatm, Ahmed Hambouz, Mouhammd Alkasassbeh | Published: 2019-05-14 | Updated: 2019-10-19

Robustification of deep net classifiers by key based diversified aggregation with pre-filtering

Authors: Olga Taran, Shideh Rezaeifar, Taras Holotyak, Slava Voloshynovskiy | Published: 2019-05-14

Sensor Defense In-Software (SDI):Practical Software Based Detection of Spoofing Attacks on Position Sensor

Authors: Kevin Sam Tharayil, Benyamin Farshteindiker, Shaked Eyal, Nir Hasidim, Roy Hershkovitz, Shani Houri, Ilia Yoffe, Michal Oren, Yossi Oren | Published: 2019-05-12

ECG Identification under Exercise and Rest Situations via Various Learning Methods

Authors: Zihan Wang, Yaoguang Li, Wei Cui | Published: 2019-05-11

Interpreting and Evaluating Neural Network Robustness

Authors: Fuxun Yu, Zhuwei Qin, Chenchen Liu, Liang Zhao, Yanzhi Wang, Xiang Chen | Published: 2019-05-10

On the Connection Between Adversarial Robustness and Saliency Map Interpretability

Authors: Christian Etmann, Sebastian Lunz, Peter Maass, Carola-Bibiane Schönlieb | Published: 2019-05-10

Adversarial Defense Framework for Graph Neural Network

Authors: Shen Wang, Zhengzhang Chen, Jingchao Ni, Xiao Yu, Zhichun Li, Haifeng Chen, Philip S. Yu | Published: 2019-05-09 | Updated: 2019-05-10