The Crossover Process: Learnability and Data Protection from Inference Attacks

Authors: Richard Nock, Giorgio Patrini, Finnian Lattimore, Tiberio Caetano | Published: 2016-06-13 | Updated: 2017-03-07

Curie: A method for protecting SVM Classifier from Poisoning Attack

Authors: Ricky Laishram, Vir Virander Phoha | Published: 2016-06-05 | Updated: 2016-06-07

Machine Learning for E-mail Spam Filtering: Review,Techniques and Trends

Authors: Alexy Bhowmick, Shyamanta M. Hazarika | Published: 2016-06-03

SUIS: An Online Graphical Signature-Based User Identification System

Authors: Shahid Alam | Published: 2016-05-29

Data-driven software security: Models and methods

Authors: Úlfar Erlingsson | Published: 2016-05-27

Deep Structured Energy Based Models for Anomaly Detection

Authors: Shuangfei Zhai, Yu Cheng, Weining Lu, Zhongfei Zhang | Published: 2016-05-25 | Updated: 2016-06-16

A note on privacy preserving iteratively reweighted least squares

Authors: Mijung Park, Max Welling | Published: 2016-05-24

Transferability in Machine Learning: from Phenomena to Black-Box Attacks using Adversarial Samples

Authors: Nicolas Papernot, Patrick McDaniel, Ian Goodfellow | Published: 2016-05-24

A First Look at Ad-block Detection: A New Arms Race on the Web

Authors: Muhammad Haris Mughees, Zhiyun Qian, Zubair Shafiq, Karishma Dash, Pan Hui | Published: 2016-05-19

On-Average KL-Privacy and its equivalence to Generalization for Max-Entropy Mechanisms

Authors: Yu-Xiang Wang, Jing Lei, Stephen E. Fienberg | Published: 2016-05-08