Ensemble Methods as a Defense to Adversarial Perturbations Against Deep Neural Networks

Authors: Thilo Strauss, Markus Hanselmann, Andrej Junginger, Holger Ulmer | Published: 2017-09-11 | Updated: 2018-02-08

A Neural Network Architecture Combining Gated Recurrent Unit (GRU) and Support Vector Machine (SVM) for Intrusion Detection in Network Traffic Data

Authors: Abien Fred Agarap | Published: 2017-09-10 | Updated: 2019-02-07

Towards Proving the Adversarial Robustness of Deep Neural Networks

Authors: Guy Katz, Clark Barrett, David L. Dill, Kyle Julian, Mykel J. Kochenderfer | Published: 2017-09-08

Privacy Risk in Machine Learning: Analyzing the Connection to Overfitting

Authors: Samuel Yeom, Irene Giacomelli, Matt Fredrikson, Somesh Jha | Published: 2017-09-05 | Updated: 2018-05-04

PassGAN: A Deep Learning Approach for Password Guessing

Authors: Briland Hitaj, Paolo Gasti, Giuseppe Ateniese, Fernando Perez-Cruz | Published: 2017-09-01 | Updated: 2019-02-14

RON-Gauss: Enhancing Utility in Non-Interactive Private Data Release

Authors: Thee Chanyaswad, Changchang Liu, Prateek Mittal | Published: 2017-08-31 | Updated: 2018-10-16

On Security and Sparsity of Linear Classifiers for Adversarial Settings

Authors: Ambra Demontis, Paolo Russu, Battista Biggio, Giorgio Fumera, Fabio Roli | Published: 2017-08-31

Coppersmith’s lattices and “focus groups”: an attack on small-exponent RSA

Authors: Stephen D. Miller, Bhargav Narayanan, Ramarathnam Venkatesan | Published: 2017-08-30 | Updated: 2020-12-16

Implicit Smartphone User Authentication with Sensors and Contextual Machine Learning

Authors: Wei-Han Lee, Ruby B. Lee | Published: 2017-08-30

POISED: Spotting Twitter Spam Off the Beaten Paths

Authors: Shirin Nilizadeh, Francois Labreche, Alireza Sedighian, Ali Zand, Jose Fernandez, Christopher Kruegel, Gianluca Stringhini, Giovanni Vigna | Published: 2017-08-29