Generating Adversarial Examples with Adversarial Networks

Authors: Chaowei Xiao, Bo Li, Jun-Yan Zhu, Warren He, Mingyan Liu, Dawn Song | Published: 2018-01-08 | Updated: 2019-02-14

Evaluation of Machine Learning Algorithms for Intrusion Detection System

Authors: Mohammad Almseidin, Maen Alzubi, Szilveszter Kovacs, Mouhammd Alkasassbeh | Published: 2018-01-08

HeNet: A Deep Learning Approach on Intel$^\circledR$ Processor Trace for Effective Exploit Detection

Authors: Li Chen, Salmin Sultana, Ravi Sahita | Published: 2018-01-08

Adversarial Perturbation Intensity Achieving Chosen Intra-Technique Transferability Level for Logistic Regression

Authors: Martin Gubri | Published: 2018-01-06

A Novel Hybrid Biometric Electronic Voting System: Integrating Finger Print and Face Recognition

Authors: Shahram Najam Syed, Aamir Zeb Shaikh, Shabbar Naqvi | Published: 2018-01-05

Learning from Pseudo-Randomness With an Artificial Neural Network – Does God Play Pseudo-Dice?

Authors: Fenglei Fan, Ge Wang | Published: 2018-01-05

Learning from Mutants: Using Code Mutation to Learn and Monitor Invariants of a Cyber-Physical System

Authors: Yuqi Chen, Christopher M. Poskitt, Jun Sun | Published: 2018-01-03 | Updated: 2018-06-13

Did you hear that? Adversarial Examples Against Automatic Speech Recognition

Authors: Moustafa Alzantot, Bharathan Balaji, Mani Srivastava | Published: 2018-01-02

A Deep Belief Network Based Machine Learning System for Risky Host Detection

Authors: Wangyan Feng, Shuning Wu, Xiaodan Li, Kevin Kunkle | Published: 2017-12-29

Application of Convolutional Neural Network to Predict Airfoil Lift Coefficient

Authors: Yao Zhang, Woong-Je Sung, Dimitri Mavris | Published: 2017-12-29 | Updated: 2018-01-16