Active Deep Learning Attacks under Strict Rate Limitations for Online API Calls

Authors: Yi Shi, Yalin E. Sagduyu, Kemal Davaslioglu, Jason H. Li | Published: 2018-11-05

Security for Machine Learning-based Systems: Attacks and Challenges during Training and Inference

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Muhammad Shafique | Published: 2018-11-05

FAdeML: Understanding the Impact of Pre-Processing Noise Filtering on Adversarial Machine Learning

Authors: Faiq Khalid, Muhammmad Abdullah Hanif, Semeen Rehman, Junaid Qadir, Muhammad Shafique | Published: 2018-11-04

SSCNets: Robustifying DNNs using Secure Selective Convolutional Filters

Authors: Hassan Ali, Faiq Khalid, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-15

QuSecNets: Quantization-based Defense Mechanism for Securing Deep Neural Network against Adversarial Attacks

Authors: Faiq Khalid, Hassan Ali, Hammad Tariq, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-04 | Updated: 2020-05-14

Structure and Content of the Visible Darknet

Authors: Georgia Avarikioti, Roman Brunner, Aggelos Kiayias, Roger Wattenhofer, Dionysis Zindros | Published: 2018-11-04 | Updated: 2018-11-07

Learning to Defend by Learning to Attack

Authors: Haoming Jiang, Zhehui Chen, Yuyang Shi, Bo Dai, Tuo Zhao | Published: 2018-11-03 | Updated: 2021-05-02

A Marauder’s Map of Security and Privacy in Machine Learning

Authors: Nicolas Papernot | Published: 2018-11-03

TrISec: Training Data-Unaware Imperceptible Security Attacks on Deep Neural Networks

Authors: Faiq Khalid, Muhammad Abdullah Hanif, Semeen Rehman, Rehan Ahmed, Muhammad Shafique | Published: 2018-11-02 | Updated: 2020-05-14

Towards Adversarial Malware Detection: Lessons Learned from PDF-based Attacks

Authors: Davide Maiorca, Battista Biggio, Giorgio Giacinto | Published: 2018-11-02 | Updated: 2020-04-14