Evaluating Adversarial Evasion Attacks in the Context of Wireless Communications

Authors: Bryse Flowers, R. Michael Buehrer, William C. Headley | Published: 2019-03-01

Detecting Target-Area Link-Flooding DDoS Attacks using Traffic Analysis and Supervised Learning

Authors: Mostafa Rezazad, Matthias R. Brust, Mohammad Akbari, Pascal Bouvry, Ngai-Man Cheung | Published: 2019-03-01

TrojDRL: Trojan Attacks on Deep Reinforcement Learning Agents

Authors: Panagiota Kiourti, Kacper Wardega, Susmit Jha, Wenchao Li | Published: 2019-03-01

Enhancing the Robustness of Deep Neural Networks by Boundary Conditional GAN

Authors: Ke Sun, Zhanxing Zhu, Zhouchen Lin | Published: 2019-02-28

Towards Understanding Adversarial Examples Systematically: Exploring Data Size, Task and Model Factors

Authors: Ke Sun, Zhanxing Zhu, Zhouchen Lin | Published: 2019-02-28

AutoGAN-based Dimension Reduction for Privacy Preservation

Authors: Hung Nguyen, Di Zhuang, Pei-Yuan Wu, Morris Chang | Published: 2019-02-27 | Updated: 2021-07-27

Tensor Dropout for Robust Learning

Authors: Arinbjörn Kolbeinsson, Jean Kossaifi, Yannis Panagakis, Adrian Bulat, Anima Anandkumar, Ioanna Tzoulaki, Paul Matthews | Published: 2019-02-27 | Updated: 2020-12-11

Adversarial Attacks on Time Series

Authors: Fazle Karim, Somshubra Majumdar, Houshang Darabi | Published: 2019-02-27 | Updated: 2019-03-01

The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection

Authors: Muhammad Zaid Hameed, Andras Gyorgy, Deniz Gunduz | Published: 2019-02-27 | Updated: 2020-04-07

Distributed Byzantine Tolerant Stochastic Gradient Descent in the Era of Big Data

Authors: Richeng Jin, Xiaofan He, Huaiyu Dai | Published: 2019-02-27 | Updated: 2019-03-06