Do Not Return Similarity: Face Recovery with Distance

Authors: Mingtian Tan, Zhe Zhou | Published: 2019-01-28 | Updated: 2019-08-06

Bayesian Differential Privacy for Machine Learning

Authors: Aleksei Triastcyn, Boi Faltings | Published: 2019-01-28 | Updated: 2020-08-19

Interpretable Complex-Valued Neural Networks for Privacy Protection

Authors: Liyao Xiang, Haotian Ma, Hao Zhang, Yifan Zhang, Jie Ren, Quanshi Zhang | Published: 2019-01-28 | Updated: 2020-01-14

Improving Adversarial Robustness via Promoting Ensemble Diversity

Authors: Tianyu Pang, Kun Xu, Chao Du, Ning Chen, Jun Zhu | Published: 2019-01-25 | Updated: 2019-05-29

Sitatapatra: Blocking the Transfer of Adversarial Samples

Authors: Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert Mullins, Ross Anderson, Cheng-Zhong Xu | Published: 2019-01-23 | Updated: 2019-11-21

PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography

Authors: Maksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas | Published: 2019-01-23 | Updated: 2019-04-10

Universal Rules for Fooling Deep Neural Networks based Text Classification

Authors: Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2019-01-22 | Updated: 2019-04-03

A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks — Prevention and Prediction for Combating Terrorism

Authors: Vivek Kumar, Manuel Mazzara, Maj. Gen., Angelo Messina, JooYoung Lee | Published: 2019-01-19 | Updated: 2019-02-21

ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System

Authors: Huangxun Chen, Chenyu Huang, Qianyi Huang, Qian Zhang, Wei Wang | Published: 2019-01-12 | Updated: 2020-01-14

FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals

Authors: Umur Aybars Ciftci, Ilke Demir | Published: 2019-01-08 | Updated: 2020-07-19