Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives

Authors: Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, Mahesh Shirole | Published: 2018-11-13

RadIoT: Radio Communications Intrusion Detection for IoT – A Protocol Independent Approach

Authors: Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre | Published: 2018-11-09

Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses

Authors: Thomas A. Hogan, Bhavya Kailkhura | Published: 2018-11-09 | Updated: 2018-11-13

Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering

Authors: Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, Biplav Srivastava | Published: 2018-11-09

YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes

Authors: Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand | Published: 2018-11-08 | Updated: 2018-12-18

AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning

Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh | Published: 2018-11-08 | Updated: 2019-08-26

MixTrain: Scalable Training of Verifiably Robust Neural Networks

Authors: Shiqi Wang, Yizheng Chen, Ahmed Abdou, Suman Jana | Published: 2018-11-06 | Updated: 2018-12-01

Exploring Connections Between Active Learning and Model Extraction

Authors: Varun Chandrasekaran, Kamalika Chaudhuri, Irene Giacomelli, Somesh Jha, Songbai Yan | Published: 2018-11-05 | Updated: 2019-11-20

Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls

Authors: Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li | Published: 2018-11-05

Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique | Published: 2018-11-05