Clipping free attacks against artificial neural networks

Authors: Boussad Addad, Jerome Kodjabachian, Christophe Meyer | Published: 2018-03-26 | Updated: 2018-03-28

Security Theater: On the Vulnerability of Classifiers to Exploratory Attacks

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Joung Woo Ryu | Published: 2018-03-24

A Dynamic-Adversarial Mining Approach to the Security of Machine Learning

Authors: Tegjyot Singh Sethi, Mehmed Kantardzic, Lingyu Lyua, Jiashun Chen | Published: 2018-03-24

Datasheets for Datasets

Authors: Timnit Gebru, Jamie Morgenstern, Briana Vecchione, Jennifer Wortman Vaughan, Hanna Wallach, Hal Daumé III, Kate Crawford | Published: 2018-03-23 | Updated: 2021-12-01

Improving DNN Robustness to Adversarial Attacks using Jacobian Regularization

Authors: Daniel Jakubovitz, Raja Giryes | Published: 2018-03-23 | Updated: 2019-05-28

Robust Blind Deconvolution via Mirror Descent

Authors: Sathya N. Ravi, Ronak Mehta, Vikas Singh | Published: 2018-03-21

Adversarial Defense based on Structure-to-Signal Autoencoders

Authors: Joachim Folz, Sebastian Palacio, Joern Hees, Damian Borth, Andreas Dengel | Published: 2018-03-21

Resilient Monotone Sequential Maximization

Authors: Vasileios Tzoumas, Ali Jadbabaie, George J. Pappas | Published: 2018-03-21 | Updated: 2020-12-16

Technical Report: When Does Machine Learning FAIL? Generalized Transferability for Evasion and Poisoning Attacks

Authors: Octavian Suciu, Radu Mărginean, Yiğitcan Kaya, Hal Daumé III, Tudor Dumitraş | Published: 2018-03-19 | Updated: 2019-03-08

Towards an Efficient Anomaly-Based Intrusion Detection for Software-Defined Networks

Authors: Majd Latah, Levent Toker | Published: 2018-03-18 | Updated: 2018-08-19