An Adversarial Approach for Explainable AI in Intrusion Detection Systems

Authors: Daniel L. Marino, Chathurika S. Wickramasinghe, Milos Manic | Published: 2018-11-28

Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness

Authors: Siddique Latif, Rajib Rana, Junaid Qadir | Published: 2018-11-28 | Updated: 2018-12-30

Robust Classification of Financial Risk

Authors: Suproteem K. Sarkar, Kojin Oshiba, Daniel Giebisch, Yaron Singer | Published: 2018-11-27

A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks

Authors: Jinghui Chen, Dongruo Zhou, Jinfeng Yi, Quanquan Gu | Published: 2018-11-27 | Updated: 2019-09-15

Distributed and Secure ML with Self-tallying Multi-party Aggregation

Authors: Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl Gunter | Published: 2018-11-26

Generalised Differential Privacy for Text Document Processing

Authors: Natasha Fernandes, Mark Dras, Annabelle McIver | Published: 2018-11-26 | Updated: 2019-02-05

Compressible and Learnable Encryption for Untrusted Cloud Environments

Authors: Hitoshi Kiya | Published: 2018-11-26

Faster CryptoNets: Leveraging Sparsity for Real-World Encrypted Inference

Authors: Edward Chou, Josh Beal, Daniel Levy, Serena Yeung, Albert Haque, Li Fei-Fei | Published: 2018-11-25

A Fully Private Pipeline for Deep Learning on Electronic Health Records

Authors: Edward Chou, Thao Nguyen, Josh Beal, Albert Haque, Li Fei-Fei | Published: 2018-11-25

Biscotti: A Ledger for Private and Secure Peer-to-Peer Machine Learning

Authors: Muhammad Shayan, Clement Fung, Chris J. M. Yoon, Ivan Beschastnikh | Published: 2018-11-24 | Updated: 2019-12-12