Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression

Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Fred Hohman, Siwei Li, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2018-02-19

Are Generative Classifiers More Robust to Adversarial Attacks?

Authors: Yingzhen Li, John Bradshaw, Yash Sharma | Published: 2018-02-19 | Updated: 2019-05-27

Actions Speak Louder Than Goals: Valuing Player Actions in Soccer

Authors: Tom Decroos, Lotte Bransen, Jan Van Haaren, Jesse Davis | Published: 2018-02-18 | Updated: 2019-07-10

WebEye – Automated Collection of Malicious HTTP Traffic

Authors: Johann Vierthaler, Roman Kruszelnicki, Julian Schütte | Published: 2018-02-16

Adversarial Risk and the Dangers of Evaluating Against Weak Attacks

Authors: Jonathan Uesato, Brendan O'Donoghue, Aaron van den Oord, Pushmeet Kohli | Published: 2018-02-15 | Updated: 2018-06-12

Stealing Hyperparameters in Machine Learning

Authors: Binghui Wang, Neil Zhenqiang Gong | Published: 2018-02-14 | Updated: 2019-09-07

Generative Models for Spear Phishing Posts on Social Media

Authors: John Seymour, Philip Tully | Published: 2018-02-14

Security Analysis and Enhancement of Model Compressed Deep Learning Systems under Adversarial Attacks

Authors: Qi Liu, Tao Liu, Zihao Liu, Yanzhi Wang, Yier Jin, Wujie Wen | Published: 2018-02-14 | Updated: 2018-03-19

Understanding Membership Inferences on Well-Generalized Learning Models

Authors: Yunhui Long, Vincent Bindschaedler, Lei Wang, Diyue Bu, Xiaofeng Wang, Haixu Tang, Carl A. Gunter, Kai Chen | Published: 2018-02-13

Distributed One-class Learning

Authors: Ali Shahin Shamsabadi, Hamed Haddadi, Andrea Cavallaro | Published: 2018-02-10