The Second Order Linear Model

Authors: Ming Lin, Shuang Qiu, Bin Hong, Jieping Ye | Published: 2017-03-02 | Updated: 2017-06-23

Detecting Adversarial Samples from Artifacts

Authors: Reuben Feinman, Ryan R. Curtin, Saurabh Shintre, Andrew B. Gardner | Published: 2017-03-01 | Updated: 2017-11-15

Preserving Differential Privacy Between Features in Distributed Estimation

Authors: Christina Heinze-Deml, Brian McWilliams, Nicolai Meinshausen | Published: 2017-03-01 | Updated: 2017-06-27

eXpose: A Character-Level Convolutional Neural Network with Embeddings For Detecting Malicious URLs, File Paths and Registry Keys

Authors: Joshua Saxe, Konstantin Berlin | Published: 2017-02-27

Bayes, not Naïve: Security Bounds on Website Fingerprinting Defenses

Authors: Giovanni Cherubin | Published: 2017-02-24 | Updated: 2017-08-23

Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning

Authors: Briland Hitaj, Giuseppe Ateniese, Fernando Perez-Cruz | Published: 2017-02-24 | Updated: 2017-09-14

Steganalysis of 3D Objects Using Statistics of Local Feature Sets

Authors: Zhenyu Li, Adrian G. Bors | Published: 2017-02-23

Adversarial examples for generative models

Authors: Jernej Kos, Ian Fischer, Dawn Song | Published: 2017-02-22

On the (Statistical) Detection of Adversarial Examples

Authors: Kathrin Grosse, Praveen Manoharan, Nicolas Papernot, Michael Backes, Patrick McDaniel | Published: 2017-02-21 | Updated: 2017-10-17

Generating Adversarial Malware Examples for Black-Box Attacks Based on GAN

Authors: Weiwei Hu, Ying Tan | Published: 2017-02-20