A note on hyperparameters in black-box adversarial examples

Authors: Jamie Hayes | Published: 2018-11-15

Adversarial Examples from Cryptographic Pseudo-Random Generators

Authors: Sébastien Bubeck, Yin Tat Lee, Eric Price, Ilya Razenshteyn | Published: 2018-11-15

Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives

Authors: Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, Mahesh Shirole | Published: 2018-11-13

RadIoT: Radio Communications Intrusion Detection for IoT – A Protocol Independent Approach

Authors: Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre | Published: 2018-11-09

Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses

Authors: Thomas A. Hogan, Bhavya Kailkhura | Published: 2018-11-09 | Updated: 2018-11-13

Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering

Authors: Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, Biplav Srivastava | Published: 2018-11-09

YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes

Authors: Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand | Published: 2018-11-08 | Updated: 2018-12-18

AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning

Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh | Published: 2018-11-08 | Updated: 2019-08-26

MixTrain: Scalable Training of Verifiably Robust Neural Networks

Authors: Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana | Published: 2018-11-06 | Updated: 2018-12-01

Exploring Connections Between Active Learning and Model Extraction

Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan | Published: 2018-11-05 | Updated: 2019-11-20