Subsampled Rényi Differential Privacy and Analytical Moments Accountant

Authors: Yu-Xiang Wang, Borja Balle, Shiva Kasiviswanathan | Published: 2018-07-31 | Updated: 2018-12-04

Security and Privacy Issues in Deep Learning

Authors: Ho Bae, Jaehee Jang, Dahuin Jung, Hyemi Jang, Heonseok Ha, Hyungyu Lee, Sungroh Yoon | Published: 2018-07-31 | Updated: 2021-03-10

A Survey of Machine and Deep Learning Methods for Internet of Things (IoT) Security

Authors: Mohammed Ali Al-Garadi, Amr Mohamed, Abdulla Al-Ali, Xiaojiang Du, Mohsen Guizani | Published: 2018-07-29

Rob-GAN: Generator, Discriminator, and Adversarial Attacker

Authors: Xuanqing Liu, Cho-Jui Hsieh | Published: 2018-07-27 | Updated: 2019-04-15

Ensemble-based Multi-Filter Feature Selection Method for DDoS Detection in Cloud Computing

Authors: Opeyemi Osanaiye, Kim-Kwang Raymond Choo2, Ali Dehghantanha, Zheng Xu, Mqhele Dlodlo | Published: 2018-07-27

Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware

Authors: James Baldwin, Ali Dehghantanha | Published: 2018-07-27

Leveraging Machine Learning Techniques for Windows Ransomware Network Traffic Detection

Authors: Omar M. K. Alhawi, James Baldwin, Ali Dehghantanha | Published: 2018-07-27

Limitations of the Lipschitz constant as a defense against adversarial examples

Authors: Todd Huster, Cho-Yu Jason Chiang, Ritu Chadha | Published: 2018-07-25

Architectures for Detecting Interleaved Multi-stage Network Attacks Using Hidden Markov Models

Authors: Tawfeeq Shawly, Ali Elghariani, Jason Kobes, Arif Ghafoor | Published: 2018-07-25 | Updated: 2019-10-30

Supervised and Semi-Supervised Deep Neural Networks for CSI-Based Authentication

Authors: Qian Wang, Hang Li, Zhi Chen, Dou Zhao, Shuang Ye, Jiansheng Cai | Published: 2018-07-25