Privacy-Utility Trade-off of Linear Regression under Random Projections and Additive Noise

Authors: Mehrdad Showkatbakhsh, Can Karakus, Suhas Diggavi | Published: 2019-02-13

TensorSCONE: A Secure TensorFlow Framework using Intel SGX

Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12

Adversarial Samples on Android Malware Detection Systems for IoT Systems

Authors: Xiaolei Liu, Xiaojiang Du, Xiaosong Zhang, Qingxin Zhu, Mohsen Guizani | Published: 2019-02-12

Applications of Machine Learning in Cryptography: A Survey

Authors: Mohammed M. Alani | Published: 2019-02-11

Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach

Authors: Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen | Published: 2019-02-11

Fake News Detection on Social Media using Geometric Deep Learning

Authors: Federico Monti, Fabrizio Frasca, Davide Eynard, Damon Mannion, Michael M. Bronstein | Published: 2019-02-10

Model Compression with Adversarial Robustness: A Unified Optimization Framework

Authors: Shupeng Gui, Haotao Wang, Chen Yu, Haichuan Yang, Zhangyang Wang, Ji Liu | Published: 2019-02-10 | Updated: 2019-12-28

Discretization based Solutions for Secure Machine Learning against Adversarial Attacks

Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11

Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis

Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08

Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach

Authors: Zhitao Guan, Zefang Lv, Xiaojiang Du, Longfei Wu, Mohsen Guizani | Published: 2019-02-08