TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-02 | Updated: 2020-05-14

Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks

Authors: Davide Maiorca, Battista Biggio, Giorgio Giacinto | Published: 2018-11-02 | Updated: 2020-04-14

Stronger Data Poisoning Attacks Break Data Sanitization Defenses

Authors: Pang Wei Koh, Jacob Steinhardt, Percy Liang | Published: 2018-11-02 | Updated: 2021-12-03

Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset

Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull | Published: 2018-11-02

Exposing Deep Fakes Using Inconsistent Head Poses

Authors: Xin Yang, Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2018-11-13

Exposing DeepFake Videos By Detecting Face Warping Artifacts

Authors: Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2019-05-22

Defining a Metric Space of Host Logs and Operational Use Cases

Authors: Miki E. Verma, Robert A. Bridges | Published: 2018-11-01

Auditing Data Provenance in Text-Generation Models

Authors: Congzheng Song, Vitaly Shmatikov | Published: 2018-11-01 | Updated: 2019-05-17

Excessive Invariance Causes Adversarial Vulnerability

Authors: Jörn-Henrik Jacobsen, Jens Behrmann, Richard Zemel, Matthias Bethge | Published: 2018-11-01 | Updated: 2020-07-12

Conditionals in Homomorphic Encryption and Machine Learning Applications

Authors: Diego Chialva, Ann Dooms | Published: 2018-10-29 | Updated: 2019-05-09