Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence

Authors: Yi Han, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah Erfani | Published: 2019-02-25 | Updated: 2020-08-17

Extracting vehicle sensor signals from CAN logs for driver re-identification

Authors: Szilvia Lestyan, Gergely Acs, Gergely Biczok, Zsolt Szalay | Published: 2019-02-24 | Updated: 2019-10-25

Privacy Preserving Location Data Publishing: A Machine Learning Approach

Authors: Sina Shaham, Ming Ding, Bo Liu, Shuping Dang, Zihuai Lin, Jun Li | Published: 2019-02-24 | Updated: 2019-11-05

Evaluating Differentially Private Machine Learning in Practice

Authors: Bargav Jayaraman, David Evans | Published: 2019-02-24 | Updated: 2019-08-12

Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data

Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23

A Convex Relaxation Barrier to Tight Robustness Verification of Neural Networks

Authors: Hadi Salman, Greg Yang, Huan Zhang, Cho-Jui Hsieh, Pengchuan Zhang | Published: 2019-02-23 | Updated: 2020-01-10

Adversarial Neural Network Inversion via Auxiliary Knowledge Alignment

Authors: Ziqi Yang, Ee-Chien Chang, Zhenkai Liang | Published: 2019-02-22

A Graph-Based Machine Learning Approach for Bot Detection

Authors: Abbas Abou Daya, Mohammad A. Salahuddin, Noura Limam, Raouf Boutaba | Published: 2019-02-22

Adversarial Attacks on Graph Neural Networks via Meta Learning

Authors: Daniel Zügner, Stephan Günnemann | Published: 2019-02-22 | Updated: 2024-01-28

Quantifying Perceptual Distortion of Adversarial Examples

Authors: Matt Jordan, Naren Manoj, Surbhi Goel, Alexandros G. Dimakis | Published: 2019-02-21