Attacker Behaviour Profiling using Stochastic Ensemble of Hidden Markov Models

Authors: Soham Deshmukh, Rahul Rade, Faruk Kazi | Published: 2019-05-28 | Updated: 2021-06-06

Expected Tight Bounds for Robust Training

Authors: Salman Alsubaihi, Adel Bibi, Modar Alfadly, Abdullah Hamdi, Bernard Ghanem | Published: 2019-05-28 | Updated: 2021-06-12

Evaluation of Machine Learning-based Anomaly Detection Algorithms on an Industrial Modbus/TCP Data Set

Authors: Simon Duque Anton, Suneetha Kanoor, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28

Improving the Robustness of Deep Neural Networks via Adversarial Training with Triplet Loss

Authors: Pengcheng Li, Jinfeng Yi, Bowen Zhou, Lijun Zhang | Published: 2019-05-28

Implementing SCADA Scenarios and Introducing Attacks to Obtain Training Data for Intrusion Detection Methods

Authors: Simon Duque Antón, Michael Gundall, Daniel Fraunholz, Hans Dieter Schotten | Published: 2019-05-28

Adversarially Robust Learning Could Leverage Computational Hardness

Authors: Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody | Published: 2019-05-28 | Updated: 2019-12-19

Body Shape Privacy in Images: Understanding Privacy and Preventing Automatic Shape Extraction

Authors: Hosnieh Sattar, Katharina Krombholz, Gerard Pons-Moll, Mario Fritz | Published: 2019-05-27 | Updated: 2020-10-22

GAT: Generative Adversarial Training for Adversarial Example Detection and Robust Classification

Authors: Xuwang Yin, Soheil Kolouri, Gustavo K. Rohde | Published: 2019-05-27 | Updated: 2022-10-01

Provable robustness against all adversarial $l_p$-perturbations for $p\geq 1$

Authors: Francesco Croce, Matthias Hein | Published: 2019-05-27 | Updated: 2020-04-24

Fooling Detection Alone is Not Enough: First Adversarial Attack against Multiple Object Tracking

Authors: Yunhan Jia, Yantao Lu, Junjie Shen, Qi Alfred Chen, Zhenyu Zhong, Tao Wei | Published: 2019-05-27 | Updated: 2019-05-30