BEBP: An Poisoning Method Against Machine Learning Based IDSs

Authors: Pan Li, Qiang Liu, Wentao Zhao, Dongxu Wang, Siqi Wang | Published: 2018-03-11

Combating Adversarial Attacks Using Sparse Representations

Authors: Soorya Gopalakrishnan, Zhinus Marzi, Upamanyu Madhow, Ramtin Pedarsani | Published: 2018-03-11 | Updated: 2018-07-13

Variance Networks: When Expectation Does Not Meet Your Expectations

Authors: Kirill Neklyudov, Dmitry Molchanov, Arsenii Ashukha, Dmitry Vetrov | Published: 2018-03-10 | Updated: 2019-02-18

Detecting Adversarial Examples – A Lesson from Multimedia Forensics

Authors: Pascal Schöttle, Alexander Schlögl, Cecilia Pasquini, Rainer Böhme | Published: 2018-03-09

Homomorphic Encryption for Speaker Recognition: Protection of Biometric Templates and Vendor Model Parameters

Authors: Andreas Nautsch, Sergey Isadskiy, Jascha Kolberg, Marta Gomez-Barrero, Christoph Busch | Published: 2018-03-09

Explaining Black-box Android Malware Detection

Authors: Marco Melis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2018-03-09 | Updated: 2018-10-29

Generating Artificial Data for Private Deep Learning

Authors: Aleksei Triastcyn, Boi Faltings | Published: 2018-03-08 | Updated: 2019-04-28

Stochastic Activation Pruning for Robust Adversarial Defense

Authors: Guneet S. Dhillon, Kamyar Azizzadenesheli, Zachary C. Lipton, Jeremy Bernstein, Jean Kossaifi, Aran Khanna, Anima Anandkumar | Published: 2018-03-05

Label Sanitization against Label Flipping Poisoning Attacks

Authors: Andrea Paudice, Luis Muñoz-González, Emil C. Lupu | Published: 2018-03-02 | Updated: 2018-10-02

Can we steal your vocal identity from the Internet?: Initial investigation of cloning Obama’s voice using GAN, WaveNet and low-quality found data

Authors: Jaime Lorenzo-Trueba, Fuming Fang, Xin Wang, Isao Echizen, Junichi Yamagishi, Tomi Kinnunen | Published: 2018-03-02