BinPro: A Tool for Binary Source Code Provenance

Authors: Dhaval Miyani, Zhen Huang, David Lie | Published: 2017-11-02

Improving SIEM capabilities through an enhanced probe for encrypted Skype traffic detection

Authors: Mario Di Mauro, Cesario Di Sarno | Published: 2017-11-01

Attacking Binarized Neural Networks

Authors: Angus Galloway, Graham W. Taylor, Medhat Moussa | Published: 2017-11-01 | Updated: 2018-01-31

Attacking the Madry Defense Model with $L_1$-based Adversarial Examples

Authors: Yash Sharma, Pin-Yu Chen | Published: 2017-10-30 | Updated: 2018-07-27

Certifying Some Distributional Robustness with Principled Adversarial Training

Authors: Aman Sinha, Hongseok Namkoong, Riccardo Volpi, John Duchi | Published: 2017-10-29 | Updated: 2020-05-01

Interpretation of Neural Networks is Fragile

Authors: Amirata Ghorbani, Abubakar Abid, James Zou | Published: 2017-10-29 | Updated: 2018-11-06

Context-Aware Generative Adversarial Privacy

Authors: Chong Huang, Peter Kairouz, Xiao Chen, Lalitha Sankar, Ram Rajagopal | Published: 2017-10-26 | Updated: 2017-12-03

Maximum Principle Based Algorithms for Deep Learning

Authors: Qianxiao Li, Long Chen, Cheng Tai, Weinan E | Published: 2017-10-26 | Updated: 2018-06-02

Malware Detection by Eating a Whole EXE

Authors: Edward Raff, Jon Barker, Jared Sylvester, Robert Brandon, Bryan Catanzaro, Charles Nicholas | Published: 2017-10-25

One pixel attack for fooling deep neural networks

Authors: Jiawei Su, Danilo Vasconcellos Vargas, Sakurai Kouichi | Published: 2017-10-24 | Updated: 2019-10-17