A review of homomorphic encryption and software tools for encrypted statistical machine learning

Authors: Louis J. M. Aslett, Pedro M. Esperança, Chris C. Holmes | Published: 2015-08-26

Efficient Private Statistics with Succinct Sketches

Authors: Luca Melis, George Danezis, Emiliano De Cristofaro | Published: 2015-08-25 | Updated: 2016-01-06

Deep Neural Network Based Malware Detection Using Two Dimensional Binary Program Features

Authors: Joshua Saxe, Konstantin Berlin | Published: 2015-08-13 | Updated: 2015-09-03

Automatic Extraction of the Passing Strategies of Soccer Teams

Authors: Laszlo Gyarmati, Xavier Anguera | Published: 2015-08-10

Using Deep Learning for Detecting Spoofing Attacks on Speech Signals

Authors: Alan Godoy, Flávio Simões, José Augusto Stuchi, Marcus de Assis Angeloni, Mário Uliani, Ricardo Violato | Published: 2015-08-07 | Updated: 2016-01-19

STC Anti-spoofing Systems for the ASVspoof 2015 Challenge

Authors: Sergey Novoselov, Alexandr Kozlov, Galina Lavrentyeva, Konstantin Simonchik, Vadim Shchemelinin | Published: 2015-07-29

On the Unicity of Smartphone Applications

Authors: Jagdish Prasad Achara, Gergely Acs, Claude Castelluccia | Published: 2015-07-28 | Updated: 2015-10-29

Differentially Private Ordinary Least Squares

Authors: Or Sheffet | Published: 2015-07-09 | Updated: 2017-08-21

Malware Task Identification: A Data Driven Approach

Authors: Eric Nunes, Casey Buto, Paulo Shakarian, Christian Lebiere, Stefano Bennati, Robert Thomson, Holger Jaenisch | Published: 2015-07-07

MCMC for Variationally Sparse Gaussian Processes

Authors: James Hensman, Alexander G. de G. Matthews, Maurizio Filippone, Zoubin Ghahramani | Published: 2015-06-12