Agent-Agnostic Human-in-the-Loop Reinforcement Learning

Authors: David Abel, John Salvatier, Andreas Stuhlmüller, Owain Evans | Published: 2017-01-15

Learning to Invert: Signal Recovery via Deep Convolutional Networks

Authors: Ali Mousavi, Richard G. Baraniuk | Published: 2017-01-14

What Can I Do Now? Guiding Users in a World of Automated Decisions

Authors: Matthias Gallé | Published: 2017-01-13

Shallow and Deep Networks Intrusion Detection System: A Taxonomy and Survey

Authors: Elike Hodo, Xavier Bellekens, Andrew Hamilton, Christos Tachtatzis, Robert Atkinson | Published: 2017-01-09

Private Incremental Regression

Authors: Shiva Prasad Kasiviswanathan, Kobbi Nissim, Hongxia Jin | Published: 2017-01-04

Dense Associative Memory is Robust to Adversarial Inputs

Authors: Dmitry Krotov, John J Hopfield | Published: 2017-01-04

Classification of Smartphone Users Using Internet Traffic

Authors: Andrey Finkelstein, Ron Biton, Rami Puzis, Asaf Shabtai | Published: 2017-01-01

Adversarial Examples Detection in Deep Networks with Convolutional Filter Statistics

Authors: Xin Li, Fuxin Li | Published: 2016-12-22 | Updated: 2017-10-26

DroidGen: Constraint-based and Data-Driven Policy Generation for Android

Authors: Mohamed Nassim Seghir, David Aspinall | Published: 2016-12-22

Handwritten Signature Verification Using Hand-Worn Devices

Authors: Ben Nassi, Alona Levy, Yuval Elovici, Erez Shmueli | Published: 2016-12-19