Consensus based Detection in the Presence of Data Falsification Attacks

Authors: Bhavya Kailkhura, Swastik Brahma, Pramod K. Varshney | Published: 2015-04-14

Machine Learning Methods for Attack Detection in the Smart Grid

Authors: Mete Ozay, Inaki Esnaola, Fatos T. Yarman Vural, Sanjeev R. Kulkarni, H. Vincent Poor | Published: 2015-03-22

Automated detection and classification of cryptographic algorithms in binary programs through machine learning

Authors: Diane Duros Hosfelt | Published: 2015-03-04

Detecting Malware with Information Complexity

Authors: Nadia Alshahwan, Earl T. Barr, David Clark, George Danezis | Published: 2015-02-26

Learning with Differential Privacy: Stability, Learnability and the Sufficiency and Necessity of ERM Principle

Authors: Yu-Xiang Wang, Jing Lei, Stephen E. Fienberg | Published: 2015-02-23 | Updated: 2016-04-27

PowerSpy: Location Tracking using Mobile Device Power Analysis

Authors: Yan Michalevsky, Gabi Nakibly, Aaron Schulman, Gunaa Arumugam Veerapandian, Dan Boneh | Published: 2015-02-11 | Updated: 2015-08-18

Crowd-ML: A Privacy-Preserving Learning Framework for a Crowd of Smart Devices

Authors: Jihun Hamm, Adam Champion, Guoxing Chen, Mikhail Belkin, Dong Xuan | Published: 2015-01-11

Differential Privacy and Machine Learning: a Survey and Review

Authors: Zhanglong Ji, Zachary C. Lipton, Charles Elkan | Published: 2014-12-24

Towards Deep Neural Network Architectures Robust to Adversarial Examples

Authors: Shixiang Gu, Luca Rigazio | Published: 2014-12-11 | Updated: 2015-04-09

Understanding Deep Image Representations by Inverting Them

Authors: Aravindh Mahendran, Andrea Vedaldi | Published: 2014-11-26