Simple Physical Adversarial Examples against End-to-End Autonomous Driving Models

Authors: Adith Boloor, Xin He, Christopher Gill, Yevgeniy Vorobeychik, Xuan Zhang | Published: 2019-03-12

Detection of LDDoS Attacks Based on TCP Connection Parameters

Authors: Michael Siracusano, Stavros Shiaeles, Bogdan Ghita | Published: 2019-03-12

Activation Analysis of a Byte-Based Deep Neural Network for Malware Classification

Authors: Scott E. Coull, Christopher Gardner | Published: 2019-03-12 | Updated: 2019-03-20

Supervised Machine Learning Techniques for Trojan Detection with Ring Oscillator Network

Authors: Kyle Worley, Md Tauhidur Rahman | Published: 2019-03-12

Fall of Empires: Breaking Byzantine-tolerant SGD by Inner Product Manipulation

Authors: Cong Xie, Sanmi Koyejo, Indranil Gupta | Published: 2019-03-10

Semantics Preserving Adversarial Learning

Authors: Ousmane Amadou Dia, Elnaz Barshan, Reza Babanezhad | Published: 2019-03-10 | Updated: 2019-12-21

A Novel Approach for Protection of Accounts’ Names against Hackers Combining Cluster Analysis and Chaotic Theory

Authors: Desislav Andreev, Simona Petrakieva, Ina Taralova | Published: 2019-03-08

Detection of Advanced Malware by Machine Learning Techniques

Authors: Sanjay Sharma, C. Rama Krishna, Sanjay K. Sahay | Published: 2019-03-07

Adversarial Out-domain Examples for Generative Models

Authors: Dario Pasquini, Marco Mingione, Massimo Bernaschi | Published: 2019-03-07 | Updated: 2019-05-13

GanDef: A GAN based Adversarial Training Defense for Neural Network Classifier

Authors: Guanxiong Liu, Issa Khalil, Abdallah Khreishah | Published: 2019-03-06