Private Machine Learning in TensorFlow using Secure Computation

Authors: Morten Dahl, Jason Mancuso, Yann Dupis, Ben Decoste, Morgan Giraud, Ian Livingstone, Justin Patriquin, Gavin Uhma | Published: 2018-10-18 | Updated: 2018-10-23

A Training-based Identification Approach to VIN Adversarial Examples

Authors: Yingdi Wang, Wenjia Niu, Tong Chen, Yingxiao Xiang, Jingjing Liu, Gang Li, Jiqiang Liu | Published: 2018-10-18

ReDMark: Framework for Residual Diffusion Watermarking on Deep Networks

Authors: Mahdi Ahmadi, Alireza Norouzi, S. M. Reza Soroushmehr, Nader Karimi, Kayvan Najarian, Shadrokh Samavi, Ali Emami | Published: 2018-10-16 | Updated: 2018-12-11

Shallow-Deep Networks: Understanding and Mitigating Network Overthinking

Authors: Yigitcan Kaya, Sanghyun Hong, Tudor Dumitras | Published: 2018-10-16 | Updated: 2019-05-09

Malware triage for early identification of Advanced Persistent Threat activities

Authors: Giuseppe Laurenza, Riccardo Lazzeretti, Luca Mazzotti | Published: 2018-10-16

Security Matters: A Survey on Adversarial Machine Learning

Authors: Guofu Li, Pengjia Zhu, Jin Li, Zhemin Yang, Ning Cao, Zhiyi Chen | Published: 2018-10-16 | Updated: 2018-10-23

Adaptive Fraud Detection System Using Dynamic Risk Features

Authors: Huiying Mao, Yung-wen Liu, Yuting Jia, Jay Nanduri | Published: 2018-10-10

The Adversarial Attack and Detection under the Fisher Information Metric

Authors: Chenxiao Zhao, P. Thomas Fletcher, Mixue Yu, Yaxin Peng, Guixu Zhang, Chaomin Shen | Published: 2018-10-09 | Updated: 2019-02-09

Privacy-Preserving Multiparty Learning For Logistic Regression

Authors: Wei Du, Ang Li, Qinghua Li | Published: 2018-10-04

Generating Labeled Flow Data from MAWILab Traces for Network Intrusion Detection

Authors: Jinoh Kim, Caitlin Sim, Jinhwan Choi | Published: 2018-10-03