IDMoB: IoT Data Marketplace on Blockchain

Authors: Kazım Rıfat Özyılmaz, Mehmet Doğan, Arda Yurdakul | Published: 2018-09-30

Statistical Inference Attack Against PHY-layer Key Extraction and Countermeasures

Authors: Rui Zhu, Tao Shu, Huirong Fu | Published: 2018-09-29

Adversarial Attacks and Defences: A Survey

Authors: Anirban Chakraborty, Manaar Alam, Vishal Dey, Anupam Chattopadhyay, Debdeep Mukhopadhyay | Published: 2018-09-28

Explainable Black-Box Attacks Against Model-based Authentication

Authors: Washington Garcia, Joseph I. Choi, Suman K. Adari, Somesh Jha, Kevin R. B. Butler | Published: 2018-09-28

SAIL: Machine Learning Guided Structural Analysis Attack on Hardware Obfuscation

Authors: Prabuddha Chakraborty, Jonathan Cruz, Swarup Bhunia | Published: 2018-09-27

Identification of Wearable Devices with Bluetooth

Authors: Hidayet Aksu, A. Selcuk Uluagac, Elizabeth S. Bentley | Published: 2018-09-27

Adversarial Attacks on Cognitive Self-Organizing Networks: The Challenge and the Way Forward

Authors: Muhammad Usama, Junaid Qadir, Ala Al-Fuqaha | Published: 2018-09-26

Neural Networks with Structural Resistance to Adversarial Attacks

Authors: Luca de Alfaro | Published: 2018-09-25

Fast Geometrically-Perturbed Adversarial Faces

Authors: Ali Dabouei, Sobhan Soleymani, Jeremy Dawson, Nasser M. Nasrabadi | Published: 2018-09-24 | Updated: 2018-09-28

Adversarial Defense via Data Dependent Activation Function and Total Variation Minimization

Authors: Bao Wang, Alex T. Lin, Wei Zhu, Penghang Yin, Andrea L. Bertozzi, Stanley J. Osher | Published: 2018-09-23 | Updated: 2020-04-29