Trust Region Based Adversarial Attack on Neural Networks

Authors: Zhewei Yao, Amir Gholami, Peng Xu, Kurt Keutzer, Michael Mahoney | Published: 2018-12-16

Perturbation Analysis of Learning Algorithms: A Unifying Perspective on Generation of Adversarial Examples

Authors: Emilio Rafael Balda, Arash Behboodi, Rudolf Mathar | Published: 2018-12-15

Federated Optimization in Heterogeneous Networks

Authors: Tian Li, Anit Kumar Sahu, Manzil Zaheer, Maziar Sanjabi, Ameet Talwalkar, Virginia Smith | Published: 2018-12-14 | Updated: 2020-04-21

Training Set Camouflage

Authors: Ayon Sen, Scott Alfeld, Xuezhou Zhang, Ara Vartanian, Yuzhe Ma, Xiaojin Zhu | Published: 2018-12-13

A 0.16pJ/bit Recurrent Neural Network Based PUF for Enhanced Machine Learning Atack Resistance

Authors: Nimesh Shah, Manaar Alam, Durga Prasad Sahoo, Debdeep Mukhopadhyay, Arindam Basu | Published: 2018-12-13

Thwarting Adversarial Examples: An $L_0$-RobustSparse Fourier Transform

Authors: Mitali Bafna, Jack Murtagh, Nikhil Vyas | Published: 2018-12-12

A Style-Based Generator Architecture for Generative Adversarial Networks

Authors: Tero Karras, Samuli Laine, Timo Aila | Published: 2018-12-12 | Updated: 2019-03-29

Recurrent Neural Networks for Fuzz Testing Web Browsers

Authors: Martin Sablotny, Bjørn Sand Jensen, Chris W. Johnson | Published: 2018-12-12

Anomaly Generation using Generative Adversarial Networks in Host Based Intrusion Detection

Authors: Milad Salem, Shayan Taheri, Jiann Shiun Yuan | Published: 2018-12-11

Adversarial Framing for Image and Video Classification

Authors: Konrad Zolna, Michal Zajac, Negar Rostamzadeh, Pedro O. Pinheiro | Published: 2018-12-11 | Updated: 2019-10-17