A Multiversion Programming Inspired Approach to Detecting Audio Adversarial Examples

Authors: Qiang Zeng, Jianhai Su, Chenglong Fu, Golam Kayas, Lannan Luo | Published: 2018-12-26 | Updated: 2019-12-03

PPD: Permutation Phase Defense Against Adversarial Examples in Deep Learning

Authors: Mehdi Jafarnia-Jahromi, Tasmin Chowdhury, Hsin-Tai Wu, Sayandev Mukherjee | Published: 2018-12-25 | Updated: 2020-01-04

Guessing Smart: Biased Sampling for Efficient Black-Box Adversarial Attacks

Authors: Thomas Brunner, Frederik Diehl, Michael Truong Le, Alois Knoll | Published: 2018-12-24 | Updated: 2019-05-05

Increasing the adversarial robustness and explainability of capsule networks with $γ$-capsules

Authors: David Peer, Sebastian Stabinger, Antonio Rodriguez-Sanchez | Published: 2018-12-23 | Updated: 2019-12-05

Towards resilient machine learning for ransomware detection

Authors: Li Chen, Chih-Yuan Yang, Anindya Paul, Ravi Sahita | Published: 2018-12-21 | Updated: 2019-05-16

The future of statistical disclosure control

Authors: Mark Elliot, Josep Domingo-Ferrer | Published: 2018-12-21

On the Activity Privacy of Blockchain for IoT

Authors: Ali Dorri, Clemence Roulin, Raja Jurdak, Salil Kanhere | Published: 2018-12-21 | Updated: 2019-03-14

Machine Learning in Cyber-Security – Problems, Challenges and Data Sets

Authors: Idan Amit, John Matherly, William Hewlett, Zhi Xu, Yinnon Meshi, Yigal Weinberger | Published: 2018-12-19 | Updated: 2019-04-22

Deep Transfer Learning for Static Malware Classification

Authors: Li Chen | Published: 2018-12-18

Designing Adversarially Resilient Classifiers using Resilient Feature Engineering

Authors: Kevin Eykholt, Atul Prakash | Published: 2018-12-17