A Unified Approach to Interpreting Model Predictions

Authors: Scott Lundberg, Su-In Lee | Published: 2017-05-22 | Updated: 2017-11-25

Pyramid: Enhancing Selectivity in Big Data Protection with Count Featurization

Authors: Mathias Lecuyer, Riley Spahn, Roxana Geambasu, Tzu-Kuo Huang, Siddhartha Sen | Published: 2017-05-21

Ensemble Adversarial Training: Attacks and Defenses

Authors: Florian Tramèr, Alexey Kurakin, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel | Published: 2017-05-19 | Updated: 2020-04-26

Delving into adversarial attacks on deep policies

Authors: Jernej Kos, Dawn Song | Published: 2017-05-18

A lightweight MapReduce framework for secure processing with SGX

Authors: Rafael Pires, Daniel Gavril, Pascal Felber, Emanuel Onica, Marcelo Pasin | Published: 2017-05-16

Distributed Statistical Machine Learning in Adversarial Settings: Byzantine Gradient Descent

Authors: Yudong Chen, Lili Su, Jiaming Xu | Published: 2017-05-16 | Updated: 2017-10-23

Extending Defensive Distillation

Authors: Nicolas Papernot, Patrick McDaniel | Published: 2017-05-15

Musical Instrument Recognition Using Their Distinctive Characteristics in Artificial Neural Networks

Authors: Babak Toghiani-Rizi, Marcus Windmark | Published: 2017-05-14

PerfWeb: How to Violate Web Privacy with Hardware Performance Events

Authors: Berk Gulmezoglu, Andreas Zankl, Thomas Eisenbarth, Berk Sunar | Published: 2017-05-12

Hate is not Binary: Studying Abusive Behavior of #GamerGate on Twitter

Authors: Despoina Chatzakou, Nicolas Kourtellis, Jeremy Blackburn, Emiliano De Cristofaro, Gianluca Stringhini, Athena Vakali | Published: 2017-05-09