Convolutional Neural Networks with Transformed Input based on Robust Tensor Network Decomposition

Authors: Jenn-Bing Ong, Wee-Keong Ng, C. -C. Jay Kuo | Published: 2018-11-20 | Updated: 2018-12-11

Lightweight Lipschitz Margin Training for Certified Defense against Adversarial Examples

Authors: Hajime Ono, Tsubasa Takahashi, Kazuya Kakizaki | Published: 2018-11-20

Private Selection from Private Candidates

Authors: Jingcheng Liu, Kunal Talwar | Published: 2018-11-19

How to Use Heuristics for Differential Privacy

Authors: Seth Neel, Aaron Roth, Zhiwei Steven Wu | Published: 2018-11-19

The Taboo Trap: Behavioural Detection of Adversarial Samples

Authors: Ilia Shumailov, Yiren Zhao, Robert Mullins, Ross Anderson | Published: 2018-11-18 | Updated: 2019-11-21

Regularized adversarial examples for model interpretability

Authors: Yoel Shoshan, Vadim Ratner | Published: 2018-11-18 | Updated: 2018-11-21

Prediction of Signal Sequences in Abiotic Stress Inducible Genes from Main Crops by Association Rule Mining

Authors: Un-Hyang Ho, Hye-Ok Kong | Published: 2018-11-18

Robust Website Fingerprinting Through the Cache Occupancy Channel

Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom | Published: 2018-11-17 | Updated: 2019-02-21

A note on hyperparameters in black-box adversarial examples

Authors: Jamie Hayes | Published: 2018-11-15

Adversarial Examples from Cryptographic Pseudo-Random Generators

Authors: Sébastien Bubeck, Yin Tat Lee, Eric Price, Ilya Razenshteyn | Published: 2018-11-15