Differential Privacy and Machine Learning: a Survey and Review

Authors: Zhanglong Ji, Zachary C. Lipton, Charles Elkan | Published: 2014-12-24

Towards Deep Neural Network Architectures Robust to Adversarial Examples

Authors: Shixiang Gu, Luca Rigazio | Published: 2014-12-11 | Updated: 2015-04-09

Understanding Deep Image Representations by Inverting Them

Authors: Aravindh Mahendran, Andrea Vedaldi | Published: 2014-11-26

Private Empirical Risk Minimization Beyond the Worst Case: The Effect of the Constraint Set Geometry

Authors: Kunal Talwar, Abhradeep Thakurta, Li Zhang | Published: 2014-11-20 | Updated: 2016-11-20

CONDENSER: A Graph-Based Approachfor Detecting Botnets

Authors: Pedro Camelo, Joao Moura, Ludwig Krippahl | Published: 2014-10-31

Anomaly Detection Framework Using Rule Extraction for Efficient Intrusion Detection

Authors: Antti Juvonen, Tuomo Sipola | Published: 2014-10-28

Automated Experiments on Ad Privacy Settings: A Tale of Opacity, Choice, and Discrimination

Authors: Amit Datta, Michael Carl Tschantz, Anupam Datta | Published: 2014-08-27 | Updated: 2015-03-17

Offline Signature-Based Fuzzy Vault (OSFV: Review and New Results

Authors: George S. Eskander, Robert Sabourin, Eric Granger | Published: 2014-08-18

Prediction with Advice of Unknown Number of Experts

Authors: Alexey Chernov, Vladimir Vovk | Published: 2014-08-09

An Evasion and Counter-Evasion Study in Malicious Websites Detection

Authors: Li Xu, Zhenxin Zhan, Shouhuai Xu, Keyin Ye | Published: 2014-08-08