Contextual Bandits with Random Projection

Authors: Xiaotian Yu | Published: 2019-03-20

On the Robustness of Deep K-Nearest Neighbors

Authors: Chawin Sitawarin, David Wagner | Published: 2019-03-20

An Evaluation of Bitcoin Address Classification based on Transaction History Summarization

Authors: Yu-Jing Lin, Po-Wei Wu, Cheng-Han Hsu, I-Ping Tu, Shih-wei Liao | Published: 2019-03-19

Practical Hidden Voice Attacks against Speech and Speaker Recognition Systems

Authors: Hadi Abdullah, Washington Garcia, Christian Peeters, Patrick Traynor, Kevin R. B. Butler, Joseph Wilson | Published: 2019-03-18

Clonability of anti-counterfeiting printable graphical codes: a machine learning approach

Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy | Published: 2019-03-18

Generating Adversarial Examples With Conditional Generative Adversarial Net

Authors: Ping Yu, Kaitao Song, Jianfeng Lu | Published: 2019-03-18

Adversarial Attacks on Deep Neural Networks for Time Series Classification

Authors: Hassan Ismail Fawaz, Germain Forestier, Jonathan Weber, Lhassane Idoumghar, Pierre-Alain Muller | Published: 2019-03-17 | Updated: 2019-04-26

SLSGD: Secure and Efficient Distributed On-device Machine Learning

Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta | Published: 2019-03-16 | Updated: 2019-10-01

GEE: A Gradient-based Explainable Variational Autoencoder for Network Anomaly Detection

Authors: Quoc Phong Nguyen, Kar Wai Lim, Dinil Mon Divakaran, Kian Hsiang Low, Mun Choon Chan | Published: 2019-03-15

A Research Agenda: Dynamic Models to Defend Against Correlated Attacks

Authors: Ian Goodfellow | Published: 2019-03-14