DeepImageSpam: Deep Learning based Image Spam Detection

Authors: Amara Dinesh Kumar, Vinayakumar R, Soman KP | Published: 2018-10-03

Adversarial Examples – A Complete Characterisation of the Phenomenon

Authors: Alexandru Constantin Serban, Erik Poll, Joost Visser | Published: 2018-10-02 | Updated: 2019-02-17

Improving the Generalization of Adversarial Training with Domain Adaptation

Authors: Chuanbiao Song, Kun He, Liwei Wang, John E. Hopcroft | Published: 2018-10-01 | Updated: 2019-03-15

Adv-BNN: Improved Adversarial Defense through Robust Bayesian Neural Network

Authors: Xuanqing Liu, Yao Li, Chongruo Wu, Cho-Jui Hsieh | Published: 2018-10-01 | Updated: 2019-05-04

Procedural Noise Adversarial Examples for Black-Box Attacks on Deep Convolutional Networks

Authors: Kenneth T. Co, Luis Muñoz-González, Sixte de Maupeou, Emil C. Lupu | Published: 2018-09-30 | Updated: 2019-11-23

IDMoB: IoT Data Marketplace on Blockchain

Authors: Kazım Rıfat Özyılmaz, Mehmet Doğan, Arda Yurdakul | Published: 2018-09-30

Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures

Authors: Rui Zhu, Tao Shu, Huirong Fu | Published: 2018-09-29

Adversarial Attacks and Defences: A Survey

Authors: Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay | Published: 2018-09-28

Explainable Black-Box Attacks Against Model-based Authentication

Authors: Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler | Published: 2018-09-28

SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

Authors: Prabuddha Chakraborty, Jonathan Cruz, Swarup Bhunia | Published: 2018-09-27