On the Activity Privacy of Blockchain for IoT

Authors: Ali Dorri, Clemence Roulin, Raja Jurdak, Salil Kanhere | Published: 2018-12-21 | Updated: 2019-03-14

Machine Learning in Cyber-Security – Problems, Challenges and Data Sets

Authors: Idan Amit, John Matherly, William Hewlett, Zhi Xu, Yinnon Meshi, Yigal Weinberger | Published: 2018-12-19 | Updated: 2019-04-22

Deep Transfer Learning for Static Malware Classification

Authors: Li Chen | Published: 2018-12-18

Designing Adversarially Resilient Classifiers using Resilient Feature Engineering

Authors: Kevin Eykholt, Atul Prakash | Published: 2018-12-17

Trust Region Based Adversarial Attack on Neural Networks

Authors: Zhewei Yao, Amir Gholami, Peng Xu, Kurt Keutzer, Michael Mahoney | Published: 2018-12-16

Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples

Authors: Emilio Rafael Balda, Arash Behboodi, Rudolf Mathar | Published: 2018-12-15

Federated Optimization in Heterogeneous Networks

Authors: Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, Virginia Smith | Published: 2018-12-14 | Updated: 2020-04-21

Training Set Camouflage

Authors: Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu | Published: 2018-12-13

A 0.16pJ/bit Recurrent Neural Network Based PUF for Enhanced Machine Learning Atack Resistance

Authors: Nimesh Shah, Manaar Alam, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Arindam Basu | Published: 2018-12-13

Thwarting Adversarial Examples: An $L_0$-RobustSparse Fourier Transform

Authors: Mitali Bafna, Jack Murtagh, Nikhil Vyas | Published: 2018-12-12