On the Limitation of MagNet Defense against $L_1$-based Adversarial Examples

Authors: Pei-Hsuan Lu, Pin-Yu Chen, Kang-Cheng Chen, Chia-Mu Yu | Published: 2018-04-14 | Updated: 2018-05-09

Detection of Compromised Smart Grid Devices with Machine Learning and Convolution Techniques

Authors: Cengiz Kaygusuz, Leonardo Babun, Hidayet Aksu, A. Selcuk Uluagac | Published: 2018-04-13

A Deep Learning Approach to Fast, Format-Agnostic Detection of Malicious Web Content

Authors: Joshua Saxe, Richard Harang, Cody Wild, Hillary Sanders | Published: 2018-04-13

A Grid Based Adversarial Clustering Algorithm

Authors: Wutao Wei, Nikhil Gupta, Bowei Xi | Published: 2018-04-13 | Updated: 2024-11-21

EMBER: An Open Dataset for Training Static PE Malware Machine Learning Models

Authors: Hyrum S. Anderson, Phil Roth | Published: 2018-04-12 | Updated: 2018-04-16

Machine Learning DDoS Detection for Consumer Internet of Things Devices

Authors: Rohan Doshi, Noah Apthorpe, Nick Feamster | Published: 2018-04-11

IoTSense: Behavioral Fingerprinting of IoT Devices

Authors: Bruhadeshwar Bezawada, Maalvika Bachani, Jordan Peterson, Hossein Shirazi, Indrakshi Ray, Indrajit Ray | Published: 2018-04-11

Differentially Private Confidence Intervals for Empirical Risk Minimization

Authors: Yue Wang, Daniel Kifer, Jaewoo Lee | Published: 2018-04-11

Universal Successor Representations for Transfer Reinforcement Learning

Authors: Chen Ma, Junfeng Wen, Yoshua Bengio | Published: 2018-04-11

On the Robustness of the CVPR 2018 White-Box Adversarial Example Defenses

Authors: Anish Athalye, Nicholas Carlini | Published: 2018-04-10