Prediction of Signal Sequences in Abiotic Stress Inducible Genes from Main Crops by Association Rule Mining

Authors: Un-Hyang Ho, Hye-Ok Kong | Published: 2018-11-18

Robust Website Fingerprinting Through the Cache Occupancy Channel

Authors: Anatoly Shusterman, Lachlan Kang, Yarden Haskal, Yosef Meltser, Prateek Mittal, Yossi Oren, Yuval Yarom | Published: 2018-11-17 | Updated: 2019-02-21

A note on hyperparameters in black-box adversarial examples

Authors: Jamie Hayes | Published: 2018-11-15

Adversarial Examples from Cryptographic Pseudo-Random Generators

Authors: Sébastien Bubeck, Yin Tat Lee, Eric Price, Ilya Razenshteyn | Published: 2018-11-15

Benchmarking datasets for Anomaly-based Network Intrusion Detection: KDD CUP 99 alternatives

Authors: Abhishek Divekar, Meet Parekh, Vaibhav Savla, Rudra Mishra, Mahesh Shirole | Published: 2018-11-13

RadIoT: Radio Communications Intrusion Detection for IoT – A Protocol Independent Approach

Authors: Jonathan Roux, Eric Alata, Guillaume Auriol, Mohamed Kaâniche, Vincent Nicomette, Romain Cayre | Published: 2018-11-09

Universal Decision-Based Black-Box Perturbations: Breaking Security-Through-Obscurity Defenses

Authors: Thomas A. Hogan, Bhavya Kailkhura | Published: 2018-11-09 | Updated: 2018-11-13

Detecting Backdoor Attacks on Deep Neural Networks by Activation Clustering

Authors: Bryant Chen, Wilka Carvalho, Nathalie Baracaldo, Heiko Ludwig, Benjamin Edwards, Taesung Lee, Ian Molloy, Biplav Srivastava | Published: 2018-11-09

YODA: Enabling computationally intensive contracts on blockchains with Byzantine and Selfish nodes

Authors: Sourav Das, Vinay Joseph Ribeiro, Abhijeet Anand | Published: 2018-11-08 | Updated: 2018-12-18

AdVersarial: Perceptual Ad Blocking meets Adversarial Machine Learning

Authors: Florian Tramèr, Pascal Dupré, Gili Rusak, Giancarlo Pellegrino, Dan Boneh | Published: 2018-11-08 | Updated: 2019-08-26