Responses to Critiques on Machine Learning of Criminality Perceptions (Addendum of arXiv:1611.04135)

Authors: Xiaolin Wu, Xi Zhang | Published: 2016-11-13 | Updated: 2017-05-26

Anomaly Detection in Bitcoin Network Using Unsupervised Learning Methods

Authors: Thai Pham, Steven Lee | Published: 2016-11-12 | Updated: 2017-02-25

Towards the Science of Security and Privacy in Machine Learning

Authors: Nicolas Papernot, Patrick McDaniel, Arunesh Sinha, Michael Wellman | Published: 2016-11-11

SoK: Applying Machine Learning in Security – A Survey

Authors: Heju Jiang, Jasvir Nagra, Parvez Ahammad | Published: 2016-11-10

Learning from Untrusted Data

Authors: Moses Charikar, Jacob Steinhardt, Gregory Valiant | Published: 2016-11-07 | Updated: 2017-06-11

Adversarial Machine Learning at Scale

Authors: Alexey Kurakin, Ian Goodfellow, Samy Bengio | Published: 2016-11-04 | Updated: 2017-02-11

PrivLogit: Efficient Privacy-preserving Logistic Regression by Tailoring Numerical Optimizers

Authors: Wei Xie, Yang Wang, Steven M. Boker, Donald E. Brown | Published: 2016-11-03

Differentially Private Variational Inference for Non-conjugate Models

Authors: Joonas Jälkö, Onur Dikmen, Antti Honkela | Published: 2016-10-27 | Updated: 2017-04-10

A multi-task learning model for malware classification with useful file access pattern from API call sequence

Authors: Xin Wang, Siu Ming Yiu | Published: 2016-10-19

Membership Inference Attacks against Machine Learning Models

Authors: Reza Shokri, Marco Stronati, Congzheng Song, Vitaly Shmatikov | Published: 2016-10-18 | Updated: 2017-03-31