Stronger Data Poisoning Attacks Break Data Sanitization Defenses

Authors: Pang Wei Koh, Jacob Steinhardt, Percy Liang | Published: 2018-11-02 | Updated: 2021-12-03

Towards the Development of Realistic Botnet Dataset in the Internet of Things for Network Forensic Analytics: Bot-IoT Dataset

Authors: Nickolaos Koroniotis, Nour Moustafa, Elena Sitnikova, Benjamin Turnbull | Published: 2018-11-02

Exposing Deep Fakes Using Inconsistent Head Poses

Authors: Xin Yang, Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2018-11-13

Exposing DeepFake Videos By Detecting Face Warping Artifacts

Authors: Yuezun Li, Siwei Lyu | Published: 2018-11-01 | Updated: 2019-05-22

Defining a Metric Space of Host Logs and Operational Use Cases

Authors: Miki E. Verma, Robert A. Bridges | Published: 2018-11-01

Auditing Data Provenance in Text-Generation Models

Authors: Congzheng Song, Vitaly Shmatikov | Published: 2018-11-01 | Updated: 2019-05-17

Excessive Invariance Causes Adversarial Vulnerability

Authors: Jörn-Henrik Jacobsen, Jens Behrmann, Richard Zemel, Matthias Bethge | Published: 2018-11-01 | Updated: 2020-07-12

Conditionals in Homomorphic Encryption and Machine Learning Applications

Authors: Diego Chialva, Ann Dooms | Published: 2018-10-29 | Updated: 2019-05-09

Logit Pairing Methods Can Fool Gradient-Based Attacks

Authors: Marius Mosbach, Maksym Andriushchenko, Thomas Trost, Matthias Hein, Dietrich Klakow | Published: 2018-10-29 | Updated: 2019-03-12

Rademacher Complexity for Adversarially Robust Generalization

Authors: Dong Yin, Kannan Ramchandran, Peter Bartlett | Published: 2018-10-29 | Updated: 2020-07-29