When Coding Style Survives Compilation: De-anonymizing Programmers from Executable Binaries

Authors: Aylin Caliskan, Fabian Yamaguchi, Edwin Dauber, Richard Harang, Konrad Rieck, Rachel Greenstadt, Arvind Narayanan | Published: 2015-12-28 | Updated: 2017-12-18

Using Data Analytics to Detect Anomalous States in Vehicles

Authors: Sandeep Nair Narayanan, Sudip Mittal, Anupam Joshi | Published: 2015-12-25

Deep-Spying: Spying using Smartwatch and Deep Learning

Authors: Tony Beltramelli, Sebastian Risi | Published: 2015-12-17

A machine learning approach to anomaly-based detection on Android platforms

Authors: Joshua Abah, Waziri O. V, Abdullahi M. B, Arthur U. M, Adewale O. S | Published: 2015-12-13

Where You Are Is Who You Are: User Identification by Matching Statistics

Authors: Farid M. Naini, Jayakrishnan Unnikrishnan, Patrick Thiran, Martin Vetterli | Published: 2015-12-09

Explaining reviews and ratings with PACO: Poisson Additive Co-Clustering

Authors: Chao-Yuan Wu, Alex Beutel, Amr Ahmed, Alexander J. Smola | Published: 2015-12-06

The Limitations of Deep Learning in Adversarial Settings

Authors: Nicolas Papernot, Patrick McDaniel, Somesh Jha, Matt Fredrikson, Z. Berkay Celik, Ananthram Swami | Published: 2015-11-24

Distillation as a Defense to Adversarial Perturbations against Deep Neural Networks

Authors: Nicolas Papernot, Patrick McDaniel, Xi Wu, Somesh Jha, Ananthram Swami | Published: 2015-11-14 | Updated: 2016-03-14

$k$-means: Fighting against Degeneracy in Sequential Monte Carlo with an Application to Tracking

Authors: Kai Fan, Katherine Heller | Published: 2015-11-13

Learning with a Strong Adversary

Authors: Ruitong Huang, Bing Xu, Dale Schuurmans, Csaba Szepesvari | Published: 2015-11-10 | Updated: 2016-01-16