Adversarial Logit Pairing

Authors: Harini Kannan, Alexey Kurakin, Ian Goodfellow | Published: 2018-03-16

Vulnerability of Deep Learning

Authors: Richard Kenway | Published: 2018-03-16

Chiron: Privacy-preserving Machine Learning as a Service

Authors: Tyler Hunt, Congzheng Song, Reza Shokri, Vitaly Shmatikov, Emmett Witchel | Published: 2018-03-15

Machine learning-assisted virtual patching of web applications

Authors: Gustavo Betarte, Eduardo Giménez, Rodrigo Martínez, Álvaro Pardo | Published: 2018-03-14

Securing the Internet of Things in the Age of Machine Learning and Software-defined Networking

Authors: Francesco Restuccia, Salvatore D'Oro, Tommaso Melodia | Published: 2018-03-13 | Updated: 2018-06-11

Recurrent Neural Network Attention Mechanisms for Interpretable System Log Anomaly Detection

Authors: Andy Brown, Aaron Tuor, Brian Hutchinson, Nicole Nichols | Published: 2018-03-13

Automatic Detection of Online Jihadist Hate Speech

Authors: Tom De Smedt, Guy De Pauw, Pieter Van Ostaeyen | Published: 2018-03-13

Data Science Methodology for Cybersecurity Projects

Authors: Farhad Foroughi, Peter Luksch | Published: 2018-03-12

Adversarial Malware Binaries: Evading Deep Learning for Malware Detection in Executables

Authors: Bojan Kolosnjaji, Ambra Demontis, Battista Biggio, Davide Maiorca, Giorgio Giacinto, Claudia Eckert, Fabio Roli | Published: 2018-03-12

BEBP: An Poisoning Method Against Machine Learning Based IDSs

Authors: Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang | Published: 2018-03-11