Stealing Machine Learning Models via Prediction APIs

Authors: Florian Tramèr, Fan Zhang, Ari Juels, Michael K. Reiter, Thomas Ristenpart | Published: 2016-09-09 | Updated: 2016-10-03

Towards Evaluating the Robustness of Neural Networks

Authors: Nicholas Carlini, David Wagner | Published: 2016-08-16 | Updated: 2017-03-22

A Stackelberg Game Perspective on the Conflict Between Machine Learning and Data Obfuscation

Authors: Jeffrey Pawlick, Quanyan Zhu | Published: 2016-08-08 | Updated: 2016-12-08

QPass: a Merit-based Evaluation of Soccer Passes

Authors: Laszlo Gyarmati, Rade Stanojevic | Published: 2016-08-08

Robust High-Dimensional Linear Regression

Authors: Chang Liu, Bo Li, Yevgeniy Vorobeychik, Alina Oprea | Published: 2016-08-07 | Updated: 2016-08-09

Early Methods for Detecting Adversarial Images

Authors: Dan Hendrycks, Kevin Gimpel | Published: 2016-08-01 | Updated: 2017-03-23

Attribute Learning for Network Intrusion Detection

Authors: Jorge Luis Rivero Pérez, Bernardete Ribeiro | Published: 2016-07-28

Darknet and Deepnet Mining for Proactive Cybersecurity Threat Intelligence

Authors: Eric Nunes, Ahmad Diab, Andrew Gunn, Ericsson Marin, Vineet Mishra, Vivin Paliath, John Robertson, Jana Shakarian, Amanda Thart, Paulo Shakarian | Published: 2016-07-28

Android Malware Detection Using Parallel Machine Learning Classifiers

Authors: Suleiman Y. Yerima, Sakir Sezer, Igor Muttik | Published: 2016-07-27

N-opcode Analysis for Android Malware Classification and Categorization

Authors: BooJoong Kang, Suleiman Y. Yerima, Kieran McLaughlin, Sakir Sezer | Published: 2016-07-27