Motivating the Rules of the Game for Adversarial Example Research

Authors: Justin Gilmer, Ryan P. Adams, Ian Goodfellow, David Andersen, George E. Dahl | Published: 2018-07-18 | Updated: 2018-07-20

Efficient Deep Learning on Multi-Source Private Data

Authors: Nick Hynes, Raymond Cheng, Dawn Song | Published: 2018-07-17

Online Robust Policy Learning in the Presence of Unknown Adversaries

Authors: Aaron J. Havens, Zhanhong Jiang, Soumik Sarkar | Published: 2018-07-16

Machine Learning with Membership Privacy using Adversarial Regularization

Authors: Milad Nasr, Reza Shokri, Amir Houmansadr | Published: 2018-07-16

Time Series Deinterleaving of DNS Traffic

Authors: Amir Asiaee, Hardik Goel, Shalini Ghosh, Vinod Yegneswaran, Arindam Banerjee | Published: 2018-07-16

NEUZZ: Efficient Fuzzing with Neural Program Smoothing

Authors: Dongdong She, Kexin Pei, Dave Epstein, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2018-07-15 | Updated: 2019-07-12

Model Reconstruction from Model Explanations

Authors: Smitha Milli, Ludwig Schmidt, Anca D. Dragan, Moritz Hardt | Published: 2018-07-13

Algorithms that Remember: Model Inversion Attacks and Data Protection Law

Authors: Michael Veale, Reuben Binns, Lilian Edwards | Published: 2018-07-12 | Updated: 2018-10-15

Query-Efficient Hard-label Black-box Attack:An Optimization-based Approach

Authors: Minhao Cheng, Thong Le, Pin-Yu Chen, Jinfeng Yi, Huan Zhang, Cho-Jui Hsieh | Published: 2018-07-12

Differentially-Private “Draw and Discard” Machine Learning

Authors: Vasyl Pihur, Aleksandra Korolova, Frederick Liu, Subhash Sankuratripati, Moti Yung, Dachuan Huang, Ruogu Zeng | Published: 2018-07-11 | Updated: 2018-10-10