An Efficient Flow-based Multi-level Hybrid Intrusion Detection System for Software-Defined Networks

Authors: Majd Latah, Levent Toker | Published: 2018-06-11

TAPAS: Tricks to Accelerate (encrypted) Prediction As a Service

Authors: Amartya Sanyal, Matt J. Kusner, Adrià Gascón, Varun Kanade | Published: 2018-06-09

Data Synthesis based on Generative Adversarial Networks

Authors: Noseong Park, Mahmoud Mohammadi, Kshitij Gorde, Sushil Jajodia, Hongkyu Park, Youngmin Kim | Published: 2018-06-09 | Updated: 2018-07-02

Discovering Signals from Web Sources to Predict Cyber Attacks

Authors: Palash Goyal, KSM Tozammel Hossain, Ashok Deb, Nazgol Tavabi, Nathan Bartley, Andr'es Abeliuk, Emilio Ferrara, Kristina Lerman | Published: 2018-06-08

Slalom: Fast, Verifiable and Private Execution of Neural Networks in Trusted Hardware

Authors: Florian Tramèr, Dan Boneh | Published: 2018-06-08 | Updated: 2019-02-27

Blind Justice: Fairness with Encrypted Sensitive Attributes

Authors: Niki Kilbertus, Adrià Gascón, Matt J. Kusner, Michael Veale, Krishna P. Gummadi, Adrian Weller | Published: 2018-06-08

A Study of EV BMS Cyber Security Based on Neural Network SOC Prediction

Authors: Syed Rahman, Haneen Aburub, Yemeserach Mekonnen, Arif I. Sarwat | Published: 2018-06-07

MEBN-RM: A Mapping between Multi-Entity Bayesian Network and Relational Model

Authors: Cheol Young Park, Kathryn Blackmond Laskey | Published: 2018-06-06 | Updated: 2018-06-08

Adversarial Attack on Graph Structured Data

Authors: Hanjun Dai, Hui Li, Tian Tian, Xin Huang, Lin Wang, Jun Zhu, Le Song | Published: 2018-06-06

Adversarial Regression with Multiple Learners

Authors: Liang Tong, Sixie Yu, Scott Alfeld, Yevgeniy Vorobeychik | Published: 2018-06-06