The Coming Era of AlphaHacking? A Survey of Automatic Software Vulnerability Detection, Exploitation and Patching Techniques

Authors: Tiantian Ji, Yue Wu, Chang Wang, Xi Zhang, Zhongru Wang | Published: 2018-05-28 | Updated: 2018-05-30

Defending Against Adversarial Attacks by Leveraging an Entire GAN

Authors: Gokula Krishnan Santhanam, Paulina Grnarova | Published: 2018-05-27

Intensive Preprocessing of KDD Cup 99 for Network Intrusion Classification Using Machine Learning Techniques

Authors: Ibrahim Obeidat, Nabhan Hamadneh, Mouhammd Al-kasassbeh, Mohammad Almseidin | Published: 2018-05-26 | Updated: 2018-10-05

Unsupervised Learning for Trustworthy IoT

Authors: Nikhil Banerjee, Thanassis Giannetsos, Emmanouil Panaousis, Clive Cheong Took | Published: 2018-05-25

Detecting Deceptive Reviews using Generative Adversarial Networks

Authors: Hojjat Aghakhani, Aravind Machiry, Shirin Nilizadeh, Christopher Kruegel, Giovanni Vigna | Published: 2018-05-25

Zeno: Distributed Stochastic Gradient Descent with Suspicion-based Fault-tolerance

Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-05-25 | Updated: 2019-05-18

Performing Co-Membership Attacks Against Deep Generative Models

Authors: Kin Sum Liu, Chaowei Xiao, Bo Li, Jie Gao | Published: 2018-05-24 | Updated: 2019-09-20

Cautious Deep Learning

Authors: Yotam Hechtlinger, Barnabás Póczos, Larry Wasserman | Published: 2018-05-24 | Updated: 2019-02-27

Towards Robust Training of Neural Networks by Regularizing Adversarial Gradients

Authors: Fuxun Yu, Zirui Xu, Yanzhi Wang, Chenchen Liu, Xiang Chen | Published: 2018-05-23 | Updated: 2018-06-07

Phocas: dimensional Byzantine-resilient stochastic gradient descent

Authors: Cong Xie, Oluwasanmi Koyejo, Indranil Gupta | Published: 2018-05-23