Adversarial Attacks on Deep Neural Networks for Time Series Classification

Authors: Hassan Ismail Fawaz, Germain Forestier, Jonathan Weber, Lhassane Idoumghar, Pierre-Alain Muller | Published: 2019-03-17 | Updated: 2019-04-26

SLSGD: Secure and Efficient Distributed On-device Machine Learning

Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta | Published: 2019-03-16 | Updated: 2019-10-01

GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection

Authors: Quoc Phong Nguyen, Kar Wai Lim, Dinil Mon Divakaran, Kian Hsiang Low, Mun Choon Chan | Published: 2019-03-15

A Research Agenda: Dynamic Models to Defend Against Correlated Attacks

Authors: Ian Goodfellow | Published: 2019-03-14

Attribution-driven Causal Analysis for Detection of Adversarial Examples

Authors: Susmit Jha, Sunny Raj, Steven Lawrence Fernandes, Sumit Kumar Jha, Somesh Jha, Gunjan Verma, Brian Jalaian, Ananthram Swami | Published: 2019-03-14

Machine Learning in IoT Security: Current Solutions and Future Challenges

Authors: Fatima Hussain, Rasheed Hussain, Syed Ali Hassan, Ekram Hossain | Published: 2019-03-14

ALOHA: Auxiliary Loss Optimization for Hypothesis Augmentation

Authors: Ethan M. Rudd, Felipe N. Ducau, Cody Wild, Konstantin Berlin, Richard Harang | Published: 2019-03-13

Fuzzy Rough Set Feature Selection to Enhance Phishing Attack Detection

Authors: Mahdieh Zabihimayvan, Derek Doran | Published: 2019-03-13

Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models

Authors: Adith Boloor, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-03-12

Detection of LDDoS Attacks Based on TCP Connection Parameters

Authors: Michael Siracusano, Stavros Shiaeles, Bogdan Ghita | Published: 2019-03-12