Data-Driven and Deep Learning Methodology for Deceptive Advertising and Phone Scams Detection

Authors: TonTon Hsien-De Huang, Chia-Mu Yu, Hung-Yu Kao | Published: 2017-10-15

Robust Decentralized Learning Using ADMM with Unreliable Agents

Authors: Qunwei Li, Bhavya Kailkhura, Ryan Goldhahn, Priyadip Ray, Pramod K. Varshney | Published: 2017-10-14 | Updated: 2018-05-21

Differentially Private Query Learning: from Data Publishing to Model Publishing

Authors: Tianqing Zhu, Ping Xiong, Gang Li, Wanlei Zhou, Philip S. Yu | Published: 2017-10-13

Performance Comparison of Intrusion Detection Systems and Application of Machine Learning to Snort System

Authors: Syed Ali Raza Shah, Biju Issac | Published: 2017-10-13 | Updated: 2017-11-07

Bayesian Hypernetworks

Authors: David Krueger, Chin-Wei Huang, Riashat Islam, Ryan Turner, Alexandre Lacoste, Aaron Courville | Published: 2017-10-13 | Updated: 2018-04-24

Game-Theoretic Design of Secure and Resilient Distributed Support Vector Machines with Adversaries

Authors: Rui Zhang, Quanyan Zhu | Published: 2017-10-12

CTD: Fast, Accurate, and Interpretable Method for Static and Dynamic Tensor Decompositions

Authors: Jungwoo Lee, Dongjin Choi, Lee Sael | Published: 2017-10-09

Age Group and Gender Estimation in the Wild with Deep RoR Architecture

Authors: Ke Zhang, Ce Gao, Liru Guo, Miao Sun, Xingfang Yuan, Tony X. Han, Zhenbing Zhao, Baogang Li | Published: 2017-10-09

Privacy-Preserving Deep Inference for Rich User Data on The Cloud

Authors: Seyed Ali Osia, Ali Shahin Shamsabadi, Ali Taheri, Kleomenis Katevas, Hamid R. Rabiee, Nicholas D. Lane, Hamed Haddadi | Published: 2017-10-04 | Updated: 2017-10-11

Neural Trojans

Authors: Yuntao Liu, Yang Xie, Ankur Srivastava | Published: 2017-10-03