CSI Neural Network: Using Side-channels to Recover Your Artificial Neural Network Information

Authors: Lejla Batina, Shivam Bhasin, Dirmanto Jap, Stjepan Picek | Published: 2018-10-22

Malicious Web Domain Identification using Online Credibility and Performance Data by Considering the Class Imbalance Issue

Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Yukun Bao, Yuqing Lin | Published: 2018-10-19

Exploring Adversarial Examples in Malware Detection

Authors: Octavian Suciu, Scott E. Coull, Jeffrey Johns | Published: 2018-10-18 | Updated: 2019-04-13

Private Machine Learning in TensorFlow using Secure Computation

Authors: Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, Gavin Uhma | Published: 2018-10-18 | Updated: 2018-10-23

A Training-based Identification Approach to VIN Adversarial Examples

Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18

ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks

Authors: Mahdi Ahmadi, Alireza Norouzi, S. M. Reza Soroushmehr, Nader Karimi, Kayvan Najarian, Shadrokh Samavi, Ali Emami | Published: 2018-10-16 | Updated: 2018-12-11

Shallow-Deep Networks: Understanding and Mitigating Network Overthinking

Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2018-10-16 | Updated: 2019-05-09

Malware triage for early identification of Advanced Persistent Threat activities

Authors: Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti | Published: 2018-10-16

Security Matters: A Survey on Adversarial Machine Learning

Authors: Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen | Published: 2018-10-16 | Updated: 2018-10-23

Adaptive Fraud Detection System Using Dynamic Risk Features

Authors: Huiying Mao, Yung-wen Liu, Yuting Jia, Jay Nanduri | Published: 2018-10-10