Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis

Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08

Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach

Authors: Zhitao Guan, Zefang Lv, Xiaojiang Du, Longfei Wu, Mohsen Guizani | Published: 2019-02-08

A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software

Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont | Published: 2019-02-07 | Updated: 2019-03-19

Optimizing seed inputs in fuzzing with machine learning

Authors: Liang Cheng, Yang Zhang, Yi Zhang, Chen Wu, Zhangtan Li, Yu Fu, Haisheng Li | Published: 2019-02-07

Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning

Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19

F-BLEAU: Fast Black-box Leakage Estimation

Authors: Giovanni Cherubin, Konstantinos Chatzikokolakis, Catuscia Palamidessi | Published: 2019-02-04 | Updated: 2020-10-27

Is Spiking Secure? A Comparative Study on the Security Vulnerabilities of Spiking and Deep Neural Networks

Authors: Alberto Marchisio, Giorgio Nanfa, Faiq Khalid, Muhammad Abdullah Hanif, Maurizio Martina, Muhammad Shafique | Published: 2019-02-04 | Updated: 2020-05-18

Robustness of Generalized Learning Vector Quantization Models against Adversarial Attacks

Authors: Sascha Saralajew, Lars Holdijk, Maike Rees, Thomas Villmann | Published: 2019-02-01 | Updated: 2019-03-09

The Efficacy of SHIELD under Different Threat Models

Authors: Cory Cornelius, Nilaksh Das, Shang-Tse Chen, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2019-02-01 | Updated: 2019-08-02

Robustness Certificates Against Adversarial Examples for ReLU Networks

Authors: Sahil Singla, Soheil Feizi | Published: 2019-02-01 | Updated: 2019-02-05