Attentional Heterogeneous Graph Neural Network: Application to Program Reidentification

Authors: Shen Wang, Zhengzhang Chen, Ding Li, Lu-An Tang, Jingchao Ni, Zhichun Li, Junghwan Rhee, Haifeng Chen, Philip S. Yu | Published: 2018-12-10 | Updated: 2019-05-09

Crossfire Attack Detection using Deep Learning in Software Defined ITS Networks

Authors: Akash Raj Narayanadoss, Tram Truong-Huu, Purnima Murali Mohan, Mohan Gurusamy | Published: 2018-12-10 | Updated: 2019-02-14

Deep-Net: Deep Neural Network for Cyber Security Use Cases

Authors: Vinayakumar R, Barathi Ganesh HB, Prabaharan Poornachandran, Anand Kumar M, Soman KP | Published: 2018-12-09

AutoGAN: Robust Classifier Against Adversarial Attacks

Authors: Blerta Lindqvist, Shridatt Sugrim, Rauf Izmailov | Published: 2018-12-08

Reaching Data Confidentiality and Model Accountability on the CalTrain

Authors: Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy | Published: 2018-12-07

A Hybrid Approach to Privacy-Preserving Federated Learning

Authors: Stacey Truex, Nathalie Baracaldo, Ali Anwar, Thomas Steinke, Heiko Ludwig, Rui Zhang, Yi Zhou | Published: 2018-12-07 | Updated: 2019-08-14

Deep-RBF Networks Revisited: Robust Classification with Rejection

Authors: Pourya Habib Zadeh, Reshad Hosseini, Suvrit Sra | Published: 2018-12-07

Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach

Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal | Published: 2018-12-07

Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks

Authors: Amir Moradibaad, Ramin Jalilian Mashhoud | Published: 2018-12-07 | Updated: 2018-12-13

Three Tools for Practical Differential Privacy

Authors: Koen Lennart van der Veen, Ruben Seggers, Peter Bloem, Giorgio Patrini | Published: 2018-12-07