Foolbox: A Python toolbox to benchmark the robustness of machine learning models

Authors: Jonas Rauber, Wieland Brendel, Matthias Bethge | Published: 2017-07-13 | Updated: 2018-03-20

Process Monitoring on Sequences of System Call Count Vectors

Authors: Michael Dymshits, Ben Myara, David Tolpin | Published: 2017-07-12

NO Need to Worry about Adversarial Examples in Object Detection in Autonomous Vehicles

Authors: Jiajun Lu, Hussein Sibai, Evan Fabry, David Forsyth | Published: 2017-07-12

A Survey on Resilient Machine Learning

Authors: Atul Kumar, Sameep Mehta | Published: 2017-07-11

A Machine Learning Based Intrusion Detection System for Software Defined 5G Network

Authors: Jiaqi Li, Zhifeng Zhao, Rongpeng Li | Published: 2017-07-10

6thSense: A Context-aware Sensor-based Attack Detector for Smart Devices

Authors: Amit Kumar Sikder, Hidayet Aksu, A. Selcuk Uluagac | Published: 2017-06-30

Towards Deep Learning Models Resistant to Adversarial Attacks

Authors: Aleksander Madry, Aleksandar Makelov, Ludwig Schmidt, Dimitris Tsipras, Adrian Vladu | Published: 2017-06-19 | Updated: 2019-09-04

Automated Poisoning Attacks and Defenses in Malware Detection Systems: An Adversarial Machine Learning Approach

Authors: Sen Chen, Minhui Xue, Lingling Fan, Shuang Hao, Lihua Xu, Haojin Zhu, Bo Li | Published: 2017-06-13 | Updated: 2017-10-31

Analysis of Anomalies in the Internet Traffic Observed at the Campus Network Gateway

Authors: Veronica del Carmen Estrada | Published: 2017-06-10

Certified Defenses for Data Poisoning Attacks

Authors: Jacob Steinhardt, Pang Wei Koh, Percy Liang | Published: 2017-06-09 | Updated: 2017-11-24