Using Randomness to Improve Robustness of Machine-Learning Models Against Evasion Attacks

Authors: Fan Yang, Zhiyuan Chen | Published: 2018-08-10

Android HIV: A Study of Repackaging Malware for Evading Machine-Learning Detection

Authors: Xiao Chen, Chaoran Li, Derui Wang, Sheng Wen, Jun Zhang, Surya Nepal, Yang Xiang, Kui Ren | Published: 2018-08-10 | Updated: 2021-11-16

Peek-a-Boo: I see your smart home activities, even encrypted!

Authors: Abbas Acar, Hossein Fereidooni, Tigist Abera, Amit Kumar Sikder, Markus Miettinen, Hidayet Aksu, Mauro Conti, Ahmad-Reza Sadeghi, Selcuk Uluagac | Published: 2018-08-08 | Updated: 2020-05-13

Beyond Pixel Norm-Balls: Parametric Adversaries using an Analytically Differentiable Renderer

Authors: Hsueh-Ti Derek Liu, Michael Tao, Chun-Liang Li, Derek Nowrouzezahrai, Alec Jacobson | Published: 2018-08-08 | Updated: 2019-02-17

Learning-Aided Physical Layer Authentication as an Intelligent Process

Authors: He Fang, Xianbin Wang, Lajos Hanzo | Published: 2018-08-07

Adversarial Vision Challenge

Authors: Wieland Brendel, Jonas Rauber, Alexey Kurakin, Nicolas Papernot, Behar Veliqi, Marcel Salathé, Sharada P. Mohanty, Matthias Bethge | Published: 2018-08-06 | Updated: 2018-12-06

OptStream: Releasing Time Series Privately

Authors: Ferdinando Fioretto, Pascal Van Hentenryck | Published: 2018-08-06 | Updated: 2018-10-30

Structured Adversarial Attack: Towards General Implementation and Better Interpretability

Authors: Kaidi Xu, Sijia Liu, Pu Zhao, Pin-Yu Chen, Huan Zhang, Quanfu Fan, Deniz Erdogmus, Yanzhi Wang, Xue Lin | Published: 2018-08-05 | Updated: 2019-02-19

ATMPA: Attacking Machine Learning-based Malware Visualization Detection Methods via Adversarial Examples

Authors: Xinbo Liu, Jiliang Zhang, Yaping Lin, He Li | Published: 2018-08-05 | Updated: 2019-12-30

Active Learning for Wireless IoT Intrusion Detection

Authors: Kai Yang, Jie Ren, Yanqiao Zhu, Weiyi Zhang | Published: 2018-08-04