Helping IT and OT Defenders Collaborate

Authors: Glenn A. Fink, Penny McKenzie | Published: 2019-04-16

Are Self-Driving Cars Secure? Evasion Attacks against Deep Neural Networks for Steering Angle Prediction

Authors: Alesia Chernikova, Alina Oprea, Cristina Nita-Rotaru, BaekGyu Kim | Published: 2019-04-15

CryptoNN: Training Neural Networks over Encrypted Data

Authors: Runhua Xu, James B. D. Joshi, Chao Li | Published: 2019-04-15 | Updated: 2019-04-26

Adversarial Learning in Statistical Classification: A Comprehensive Review of Defenses Against Attacks

Authors: David J. Miller, Zhen Xiang, George Kesidis | Published: 2019-04-12 | Updated: 2019-12-02

On Machine Learning DoS Attack Identification from Cloud Computing Telemetry

Authors: João Henrique Corrêa, Patrick Marques Ciarelli, Moises R. N. Ribeiro, Rodolfo da Silva Villaca | Published: 2019-04-11

STC Antispoofing Systems for the ASVspoof2019 Challenge

Authors: Galina Lavrentyeva, Sergey Novoselov, Andzhukaev Tseren, Marina Volkova, Artem Gorlanov, Alexandr Kozlov | Published: 2019-04-11

Universal Lipschitz Approximation in Bounded Depth Neural Networks

Authors: Jeremy E. J. Cohen, Todd Huster, Ra Cohen | Published: 2019-04-09

Private Hierarchical Clustering and Efficient Approximation

Authors: Xianrui Meng, Dimitrios Papadopoulos, Alina Oprea, Nikos Triandopoulos | Published: 2019-04-09 | Updated: 2021-10-01

A Target-Agnostic Attack on Deep Models: Exploiting Security Vulnerabilities of Transfer Learning

Authors: Shahbaz Rezaei, Xin Liu | Published: 2019-04-08 | Updated: 2020-01-29

Malware Evasion Attack and Defense

Authors: Yonghong Huang, Utkarsh Verma, Celeste Fralick, Gabriel Infante-Lopez, Brajesh Kumarz, Carl Woodward | Published: 2019-04-07 | Updated: 2019-04-16