Recent research has proposed approaches that modify speech to defend aga...
Perturbative availability poisoning (PAP) adds small changes to images t...
We introduce ShortcutGen, a new data poisoning attack that generates
sam...
Recently, researchers have turned their attention to recommender systems...
This paper studies user attributes in light of current concerns in the
r...
Computer vision systems are remarkably vulnerable to adversarial
perturb...
Deep learning holds great promise for detecting discriminatory language ...
Recent work has shown that imperceptible perturbations can be applied to...
We present a case that the newly emerging field of synthetic data in the...
There is broad consensus among researchers studying adversarial examples...
We introduce screen gleaning, a TEMPEST attack in which the screen of a
...
We propose Adversarial Color Enhancement (ACE), a novel approach to
gene...
This paper demonstrates the potential of statistical disclosure control ...
E-commerce platforms provide their customers with ranked lists of recomm...
We propose Adversarial Color Filtering (AdvCF), an approach that uses a
...
The success of image perturbations that are designed to fool image
class...
Today's popular TV series tend to develop continuous, complex plots span...
Today's popular TV series tend to develop continuous, complex plots span...
An adversarial query is an image that has been modified to disrupt
conte...
In this work, we propose FM-Pair, an adaptation of Factorization Machine...
As deep learning approaches to scene recognition emerge, they have conti...
This document contains the outcome of the first Human behaviour and mach...
Background music in social interaction settings can hinder conversation....
In this paper, we present a subclass-representation approach that predic...