Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark

Authors: Dimitrios Sisiaridis, Olivier Markowitch | Published: 2017-12-11

Improving Malware Detection Accuracy by Extracting Icon Information

Authors: Pedro Silva, Sepehr Akhavan-Masouleh, Li Li | Published: 2017-12-10

Wild Patterns: Ten Years After the Rise of Adversarial Machine Learning

Authors: Battista Biggio, Fabio Roli | Published: 2017-12-08 | Updated: 2018-07-19

CycleGAN, a Master of Steganography

Authors: Casey Chu, Andrey Zhmoginov, Mark Sandler | Published: 2017-12-08 | Updated: 2017-12-16

Generative Adversarial Perturbations

Authors: Omid Poursaeed, Isay Katsman, Bicheng Gao, Serge Belongie | Published: 2017-12-06 | Updated: 2018-07-06

Learning Fast and Slow: PROPEDEUTICA for Real-time Malware Detection

Authors: Ruimin Sun, Xiaoyong Yuan, Pan He, Qile Zhu, Aokun Chen, Andre Gregio, Daniela Oliveira, Xiaolin Li | Published: 2017-12-04 | Updated: 2021-10-17

Improving Network Robustness against Adversarial Attacks with Compact Convolution

Authors: Rajeev Ranjan, Swami Sankaranarayanan, Carlos D. Castillo, Rama Chellappa | Published: 2017-12-03 | Updated: 2018-03-22

Where Classification Fails, Interpretation Rises

Authors: Chanh Nguyen, Georgi Georgiev, Yujie Ji, Ting Wang | Published: 2017-12-02

Together or Alone: The Price of Privacy in Collaborative Learning

Authors: Balazs Pejo, Qiang Tang, Gergely Biczok | Published: 2017-12-01 | Updated: 2018-08-24

Interpretability Beyond Feature Attribution: Quantitative Testing with Concept Activation Vectors (TCAV)

Authors: Been Kim, Martin Wattenberg, Justin Gilmer, Carrie Cai, James Wexler, Fernanda Viegas, Rory Sayres | Published: 2017-11-30 | Updated: 2018-06-07