Analyzing, Comparing, and Detecting Emerging Malware: A Graph-based Approach

Authors: Hisham Alasmary, Aminollah Khormali, Afsah Anwar, Jeman Park, Jinchun Choi, DaeHun Nyang, Aziz Mohaisen | Published: 2019-02-11

Fake News Detection on Social Media using Geometric Deep Learning

Authors: Federico Monti, Fabrizio Frasca, Davide Eynard, Damon Mannion, Michael M. Bronstein | Published: 2019-02-10

Model Compression with Adversarial Robustness: A Unified Optimization Framework

Authors: Shupeng Gui, Haotao Wang, Chen Yu, Haichuan Yang, Zhangyang Wang, Ji Liu | Published: 2019-02-10 | Updated: 2019-12-28

Discretization based Solutions for Secure Machine Learning against Adversarial Attacks

Authors: Priyadarshini Panda, Indranil Chakraborty, Kaushik Roy | Published: 2019-02-08 | Updated: 2019-02-11

Understanding the One-Pixel Attack: Propagation Maps and Locality Analysis

Authors: Danilo Vasconcellos Vargas, Jiawei Su | Published: 2019-02-08

Achieving Data Utility-Privacy Tradeoff in Internet of Medical Things: A Machine Learning Approach

Authors: Zhitao Guan, Zefang Lv, Xiaojiang Du, Longfei Wu, Mohsen Guizani | Published: 2019-02-08

A Manually-Curated Dataset of Fixes to Vulnerabilities of Open-Source Software

Authors: Serena E. Ponta, Henrik Plate, Antonino Sabetta, Michele Bezzi, Cédric Dangremont | Published: 2019-02-07 | Updated: 2019-03-19

Optimizing seed inputs in fuzzing with machine learning

Authors: Liang Cheng, Yang Zhang, Yi Zhang, Chen Wu, Zhangtan Li, Yu Fu, Haisheng Li | Published: 2019-02-07

Disguised-Nets: Image Disguising for Privacy-preserving Outsourced Deep Learning

Authors: Sagar Sharma, Keke Chen | Published: 2019-02-05 | Updated: 2019-04-19

F-BLEAU: Fast Black-box Leakage Estimation

Authors: Giovanni Cherubin, Konstantinos Chatzikokolakis, Catuscia Palamidessi | Published: 2019-02-04 | Updated: 2020-10-27