Detecting Malignant TLS Servers Using Machine Learning Techniques

Authors: Sankalp Bagaria, R. Balaji, B. S. Bindhumadhava | Published: 2017-05-25

Anti-spoofing Methods for Automatic SpeakerVerification System

Authors: Galina Lavrentyeva, Sergey Novoselov, Konstantin Simonchik | Published: 2017-05-24

Audio-replay attack detection countermeasures

Authors: Galina Lavrentyeva, Sergey Novoselov, Egor Malykh, Alexander Kozlov, Oleg Kudashev, Vadim Shchemelinin | Published: 2017-05-24

Bayesian Compression for Deep Learning

Authors: Christos Louizos, Karen Ullrich, Max Welling | Published: 2017-05-24 | Updated: 2017-11-06

LRSE: A Lightweight Efficient Searchable Encryption Scheme using Local and Global Representations

Authors: Ruihui Zhao, Yuanliang Sun, Mizuho Iwaihara | Published: 2017-05-24

Formal Guarantees on the Robustness of a Classifier against Adversarial Manipulation

Authors: Matthias Hein, Maksym Andriushchenko | Published: 2017-05-23 | Updated: 2017-11-05

Personalized and Private Peer-to-Peer Machine Learning

Authors: Aurélien Bellet, Rachid Guerraoui, Mahsa Taziki, Marc Tommasi | Published: 2017-05-23 | Updated: 2018-02-19

Exponential error rates of SDP for block models: Beyond Grothendieck’s inequality

Authors: Yingjie Fei, Yudong Chen | Published: 2017-05-23

Detecting Adversarial Image Examples in Deep Networks with Adaptive Noise Reduction

Authors: Bin Liang, Hongcheng Li, Miaoqiang Su, Xirong Li, Wenchang Shi, Xiaofeng Wang | Published: 2017-05-23 | Updated: 2019-01-09

Black-Box Attacks against RNN based Malware Detection Algorithms

Authors: Weiwei Hu, Ying Tan | Published: 2017-05-23