A Mean-Field Stackelberg Game Approach for Obfuscation Adoption in Empirical Risk Minimization

Authors: Jeffrey Pawlick, Quanyan Zhu | Published: 2017-06-08 | Updated: 2017-10-16

Localization of JPEG double compression through multi-domain convolutional neural networks

Authors: Irene Amerini, Tiberio Uricchio, Lamberto Ballan, Roberto Caldelli | Published: 2017-06-06

Adversarial-Playground: A Visualization Suite for Adversarial Sample Generation

Authors: Andrew Norton, Yanjun Qi | Published: 2017-06-06 | Updated: 2017-06-16

Context-aware, Adaptive and Scalable Android Malware Detection through Online Learning (extended version)

Authors: Annamalai Narayanan, Mahinthan Chandramohan, Lihui Chen, Yang Liu | Published: 2017-06-03 | Updated: 2017-07-06

MagNet: a Two-Pronged Defense against Adversarial Examples

Authors: Dongyu Meng, Hao Chen | Published: 2017-05-25 | Updated: 2017-09-11

Detecting Malignant TLS Servers Using Machine Learning Techniques

Authors: Sankalp Bagaria, R. Balaji, B. S. Bindhumadhava | Published: 2017-05-25

Anti-spoofing Methods for Automatic SpeakerVerification System

Authors: Galina Lavrentyeva, Sergey Novoselov, Konstantin Simonchik | Published: 2017-05-24

Audio-replay attack detection countermeasures

Authors: Galina Lavrentyeva, Sergey Novoselov, Egor Malykh, Alexander Kozlov, Oleg Kudashev, Vadim Shchemelinin | Published: 2017-05-24

Bayesian Compression for Deep Learning

Authors: Christos Louizos, Karen Ullrich, Max Welling | Published: 2017-05-24 | Updated: 2017-11-06

LRSE: A Lightweight Efficient Searchable Encryption Scheme using Local and Global Representations

Authors: Ruihui Zhao, Yuanliang Sun, Mizuho Iwaihara | Published: 2017-05-24