On the Unicity of Smartphone Applications

Authors: Jagdish Prasad Achara, Gergely Acs, Claude Castelluccia | Published: 2015-07-28 | Updated: 2015-10-29

Differentially Private Ordinary Least Squares

Authors: Or Sheffet | Published: 2015-07-09 | Updated: 2017-08-21

Malware Task Identification: A Data Driven Approach

Authors: Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch | Published: 2015-07-07

MCMC for Variationally Sparse Gaussian Processes

Authors: James Hensman, Alexander G. de G. Matthews, Maurizio Filippone, Zoubin Ghahramani | Published: 2015-06-12

Adaptive Normalized Risk-Averting Training For Deep Neural Networks

Authors: Zhiguang Wang, Tim Oates, James Lo | Published: 2015-06-08 | Updated: 2016-06-09

Dropout as a Bayesian Approximation: Representing Model Uncertainty in Deep Learning

Authors: Yarin Gal, Zoubin Ghahramani | Published: 2015-06-06 | Updated: 2016-10-04

A Deeper Look at Dataset Bias

Authors: Tatiana Tommasi, Novi Patricia, Barbara Caputo, Tinne Tuytelaars | Published: 2015-05-06

Spectral Norm of Random Kernel Matrices with Applications to Privacy

Authors: Shiva Prasad Kasiviswanathan, Mark Rudelson | Published: 2015-04-22

Detection of Information leakage in cloud

Authors: Mansaf Alam, Shuchi Sethi | Published: 2015-04-14 | Updated: 2015-11-06

Consensus based Detection in the Presence of Data Falsification Attacks

Authors: Bhavya Kailkhura, Swastik Brahma, Pramod K. Varshney | Published: 2015-04-14