Semi-supervised classification for dynamic Android malware detection

Authors: Li Chen, Mingwei Zhang, Chih-Yuan Yang, Ravi Sahita | Published: 2017-04-19

Universal Adversarial Perturbations Against Semantic Image Segmentation

Authors: Jan Hendrik Metzen, Mummadi Chaithanya Kumar, Thomas Brox, Volker Fischer | Published: 2017-04-19 | Updated: 2017-07-31

Morpheo: Traceable Machine Learning on Hidden data

Authors: Mathieu Galtier, Camille Marini | Published: 2017-04-17

A Security Monitoring Framework For Virtualization Based HEP Infrastructures

Authors: A. Gomez Ramirez, M. Martinez Pedreira, C. Grigoras, L. Betev, C. Lara, U. Kebschull | Published: 2017-04-16

The Space of Transferable Adversarial Examples

Authors: Florian Tramèr, Nicolas Papernot, Ian Goodfellow, Dan Boneh, Patrick McDaniel | Published: 2017-04-11 | Updated: 2017-05-23

Optimized Data Pre-Processing for Discrimination Prevention

Authors: Flavio P. Calmon, Dennis Wei, Karthikeyan Natesan Ramamurthy, Kush R. Varshney | Published: 2017-04-11

Interpretable Explanations of Black Boxes by Meaningful Perturbation

Authors: Ruth Fong, Andrea Vedaldi | Published: 2017-04-11 | Updated: 2021-12-03

Security Analytics of Network Flow Data of IoT and Mobile Devices (Work-in-progress)

Authors: Ashish Kundu, Chinmay Kundu, Karan K. Budhraja | Published: 2017-04-10

Learning Important Features Through Propagating Activation Differences

Authors: Avanti Shrikumar, Peyton Greenside, Anshul Kundaje | Published: 2017-04-10 | Updated: 2019-10-12

Enhancing Robustness of Machine Learning Systems via Data Transformations

Authors: Arjun Nitin Bhagoji, Daniel Cullina, Chawin Sitawarin, Prateek Mittal | Published: 2017-04-09 | Updated: 2017-11-29