Sitatapatra: Blocking the Transfer of Adversarial Samples

Authors: Ilia Shumailov, Xitong Gao, Yiren Zhao, Robert Mullins, Ross Anderson, Cheng-Zhong Xu | Published: 2019-01-23 | Updated: 2019-11-21

PD-ML-Lite: Private Distributed Machine Learning from Lighweight Cryptography

Authors: Maksim Tsikhanovich, Malik Magdon-Ismail, Muhammad Ishaq, Vassilis Zikas | Published: 2019-01-23 | Updated: 2019-04-10

Universal Rules for Fooling Deep Neural Networks based Text Classification

Authors: Di Li, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2019-01-22 | Updated: 2019-04-03

A Conjoint Application of Data Mining Techniques for Analysis of Global Terrorist Attacks — Prevention and Prediction for Combating Terrorism

Authors: Vivek Kumar, Manuel Mazzara, Maj. Gen., Angelo Messina, JooYoung Lee | Published: 2019-01-19 | Updated: 2019-02-21

ECGadv: Generating Adversarial Electrocardiogram to Misguide Arrhythmia Classification System

Authors: Huangxun Chen, Chenyu Huang, Qianyi Huang, Qian Zhang, Wei Wang | Published: 2019-01-12 | Updated: 2020-01-14

FakeCatcher: Detection of Synthetic Portrait Videos using Biological Signals

Authors: Umur Aybars Ciftci, Ilke Demir | Published: 2019-01-08 | Updated: 2020-07-19

Differentially Private ADMM for Distributed Medical Machine Learning

Authors: Jiahao Ding, Xiaoqi Qin, Wenjun Xu, Yanmin Gong, Chi Zhang, Miao Pan | Published: 2019-01-07 | Updated: 2020-12-09

RF Jamming Classification using Relative Speed Estimation in Vehicular Wireless Networks

Authors: Dimitrios Kosmanos, Dimitrios Karagiannis, Antonios Argyriou, Spyros Lalis, Leandros Maglaras | Published: 2018-12-31

Hessian-Aware Zeroth-Order Optimization for Black-Box Adversarial Attack

Authors: Haishan Ye, Zhichao Huang, Cong Fang, Chris Junchi Li, Tong Zhang | Published: 2018-12-29 | Updated: 2019-03-20

Adversarial Attack and Defense on Graph Data: A Survey

Authors: Lichao Sun, Yingtong Dou, Carl Yang, Ji Wang, Yixin Liu, Philip S. Yu, Lifang He, Bo Li | Published: 2018-12-26 | Updated: 2022-10-06