Adversarial Binaries for Authorship Identification

Authors: Xiaozhu Meng, Barton P. Miller, Somesh Jha | Published: 2018-09-21 | Updated: 2018-11-07

Secure Phrase Search for Intelligent Processing of Encrypted Data in Cloud-Based IoT

Authors: Meng Shen, Baoli Ma, Liehuang Zhu, Xiaojiang Du, Ke Xu | Published: 2018-09-21

Playing the Game of Universal Adversarial Perturbations

Authors: Julien Perolat, Mateusz Malinowski, Bilal Piot, Olivier Pietquin | Published: 2018-09-20 | Updated: 2018-09-25

Time is of the Essence: Machine Learning-based Intrusion Detection in Industrial Time Series Data

Authors: Simon Duque Anton, Lia Ahrens, Daniel Fraunholz, Hans Dieter Schotten | Published: 2018-09-20

HashTran-DNN: A Framework for Enhancing Robustness of Deep Neural Networks against Adversarial Malware Samples

Authors: Deqiang Li, Ramesh Baral, Tao Li, Han Wang, Qianmu Li, Shouhuai Xu | Published: 2018-09-18

Comparison of Deep Learning and the Classical Machine Learning Algorithm for the Malware Detection

Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore | Published: 2018-09-16

Adversarial Reinforcement Learning for Observer Design in Autonomous Systems under Cyber Attacks

Authors: Abhishek Gupta, Zhaoyuan Yang | Published: 2018-09-15

Online Cyber-Attack Detection in Smart Grid: A Reinforcement Learning Approach

Authors: Mehmet Necip Kurt, Oyetunji Ogundijo, Chong Li, Xiaodong Wang | Published: 2018-09-14

Defensive Dropout for Hardening Deep Neural Networks under Adversarial Attacks

Authors: Siyue Wang, Xiao Wang, Pu Zhao, Wujie Wen, David Kaeli, Peter Chin, Xue Lin | Published: 2018-09-13

Query-Efficient Black-Box Attack by Active Learning

Authors: Pengcheng Li, Jinfeng Yi, Lijun Zhang | Published: 2018-09-13