Bayesian SegNet: Model Uncertainty in Deep Convolutional Encoder-Decoder Architectures for Scene Understanding

Authors: Alex Kendall, Vijay Badrinarayanan, Roberto Cipolla | Published: 2015-11-09 | Updated: 2016-10-10

Sensor-based Proximity Detection in the Face of Active Adversaries

Authors: Babins Shrestha, Nitesh Saxena, Hien Thi Thu Truong, N. Asokan | Published: 2015-11-03 | Updated: 2021-04-05

Reviewer Integration and Performance Measurement for Malware Detection

Authors: Brad Miller, Alex Kantchelian, Michael Carl Tschantz, Sadia Afroz, Rekha Bachwani, Riyaz Faizullabhoy, Ling Huang, Vaishaal Shankar, Tony Wu, George Yiu, Anthony D. Joseph, J. D. Tygar | Published: 2015-10-26 | Updated: 2016-05-27

Exact Inference Techniques for the Analysis of Bayesian Attack Graphs

Authors: Luis Muñoz-González, Daniele Sgandurra, Martín Barrère, Emil Lupu | Published: 2015-10-08 | Updated: 2016-11-04

Supporting Regularized Logistic Regression Privately and Efficiently

Authors: Wenfa Li, Hongzhe Liu, Peng Yang, Wei Xie | Published: 2015-10-01

Fast Sequence Component Analysis for Attack Detection in Synchrophasor Networks

Authors: Jordan Landford, Rich Meier, Richard Barella, Xinghui Zhao, Eduardo Cotilla-Sanchez, Robert B. Bass, Scott Wallace | Published: 2015-09-17

Fame for sale: efficient detection of fake Twitter followers

Authors: Stefano Cresci, Roberto Di Pietro, Marinella Petrocchi, Angelo Spognardi, Maurizio Tesconi | Published: 2015-09-14 | Updated: 2015-11-10

Anomaly Detection for malware identification using Hardware Performance Counters

Authors: Alberto Garcia-Serrano | Published: 2015-08-29

On the Privacy Properties of Variants on the Sparse Vector Technique

Authors: Yan Chen, Ashwin Machanavajjhala | Published: 2015-08-28

Encrypted statistical machine learning: new privacy preserving methods

Authors: Louis J. M. Aslett, Pedro M. Esperança, Chris C. Holmes | Published: 2015-08-27