Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples

Authors: Adnan Siraj Rakin, Zhezhi He, Boqing Gong, Deliang Fan | Published: 2018-02-05 | Updated: 2018-02-07

IntelliAV: Building an Effective On-Device Android Malware Detector

Authors: Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto | Published: 2018-02-04

Secure Range Queries for Multiple Users

Authors: Anselme Tueno, Florian Kerschbaum | Published: 2018-02-04

Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach

Authors: Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel | Published: 2018-01-31

PrivPy: Enabling Scalable and General Privacy-Preserving Machine Learning

Authors: Yi Li, Yitao Duan, Yu Yu, Shuoyao Zhao, Wei Xu | Published: 2018-01-30 | Updated: 2020-04-21

Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning

Authors: Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, Phil Roth | Published: 2018-01-26 | Updated: 2018-01-30

Forecasting Suspicious Account Activity at Large-Scale Online Service Providers

Authors: Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu | Published: 2018-01-25

Secure $k$-ish Nearest Neighbors Classifier

Authors: Hayim Shaul, Dan Feldman, Daniela Rus | Published: 2018-01-22 | Updated: 2019-04-30

IoT Security Techniques Based on Machine Learning

Authors: Liang Xiao, Xiaoyue Wan, Xiaozhen Lu, Yanyong Zhang, Di Wu | Published: 2018-01-19

Blind De-anonymization Attacks using Social Networks

Authors: Wei-Han Lee, Changchang Liu, Shouling Ji, Prateek Mittal, Ruby Lee | Published: 2018-01-17