The Best Defense Is a Good Offense: Adversarial Attacks to Avoid Modulation Detection

Authors: Muhammad Zaid Hameed, Andras Gyorgy, Deniz Gunduz | Published: 2019-02-27 | Updated: 2020-04-07

Distributed Byzantine Tolerant Stochastic Gradient Descent in the Era of Big Data

Authors: Richeng Jin, Xiaofan He, Huaiyu Dai | Published: 2019-02-27 | Updated: 2019-03-06

Disentangled Deep Autoencoding Regularization for Robust Image Classification

Authors: Zhenyu Duan, Martin Renqiang Min, Li Erran Li, Mingbo Cai, Yi Xu, Bingbing Ni | Published: 2019-02-27

Design of intentional backdoors in sequential models

Authors: Zhaoyuan Yang, Naresh Iyer, Johan Reimann, Nurali Virani | Published: 2019-02-26

Function Space Particle Optimization for Bayesian Neural Networks

Authors: Ziyu Wang, Tongzheng Ren, Jun Zhu, Bo Zhang | Published: 2019-02-26 | Updated: 2019-05-08

Adversarial attacks hidden in plain sight

Authors: Jan Philip Göpfert, André Artelt, Heiko Wersing, Barbara Hammer | Published: 2019-02-25 | Updated: 2020-04-26

Adversarial Reinforcement Learning under Partial Observability in Autonomous Computer Network Defence

Authors: Yi Han, David Hubczenko, Paul Montague, Olivier De Vel, Tamas Abraham, Benjamin I. P. Rubinstein, Christopher Leckie, Tansu Alpcan, Sarah Erfani | Published: 2019-02-25 | Updated: 2020-08-17

Extracting vehicle sensor signals from CAN logs for driver re-identification

Authors: Szilvia Lestyan, Gergely Acs, Gergely Biczok, Zsolt Szalay | Published: 2019-02-24 | Updated: 2019-10-25

Privacy Preserving Location Data Publishing: A Machine Learning Approach

Authors: Sina Shaham, Ming Ding, Bo Liu, Shuping Dang, Zihuai Lin, Jun Li | Published: 2019-02-24 | Updated: 2019-11-05

Evaluating Differentially Private Machine Learning in Practice

Authors: Bargav Jayaraman, David Evans | Published: 2019-02-24 | Updated: 2019-08-12