
-
QEBA: Query-Efficient Boundary-Based Blackbox Attack
Machine learning (ML), especially deep neural networks (DNNs) have been ...
read it
-
RAB: Provable Robustness Against Backdoor Attacks
Recent studies have shown that deep neural networks (DNNs) are vulnerabl...
read it
-
Provable Robust Learning Based on Transformation-Specific Smoothing
As machine learning systems become pervasive, safeguarding their securit...
read it
-
Detecting AI Trojans Using Meta Neural Analysis
Machine learning models, especially neural networks (NNs), have achieved...
read it
-
A Machine Learning Approach To Prevent Malicious Calls Over Telephony Networks
Malicious calls, i.e., telephony spams and scams, have been a long-stand...
read it
-
A Neural Stochastic Volatility Model
In this paper, we show that the recent integration of statistical models...
read it
-
SQLNet: Generating Structured Queries From Natural Language Without Reinforcement Learning
Synthesizing SQL queries from natural language is a long-standing open p...
read it
-
Can you fool AI with adversarial examples on a visual Turing test?
Deep learning has achieved impressive results in many areas of Computer ...
read it
-
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
The problem of cross-platform binary code similarity detection aims at d...
read it