Abstract is missing.
- Beyond Big Data: What Can We Learn from AI Models?: Invited KeynoteAylin Caliskan. 1 [doi]
- Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection MethodsNicholas Carlini, David A. Wagner 0001. 3-14 [doi]
- ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute ModelsPin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh. 15-26 [doi]
- Towards Poisoning of Deep Learning Algorithms with Back-gradient OptimizationLuis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli. 27-38 [doi]
- Efficient Defenses Against Adversarial AttacksValentina Zantedeschi, Maria-Irina Nicolae, Ambrish Rawat. 39-49 [doi]
- An Early Warning System for Suspicious AccountsHassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu. 51-52 [doi]
- Differentially Private Noisy Search with Applications to Anomaly Detection (Abstract)Daniel M. Bittner, Anand D. Sarwate, Rebecca N. Wright. 53 [doi]
- Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention MechanismHiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma. 55-56 [doi]
- Generating Look-alike Names For Security ChallengesShuchu Han, Yifan Hu, Steven Skiena, Baris Coskun, Meizhu Liu, Hong Qin, Jaime Perez. 57-67 [doi]
- In (Cyber)Space Bots Can Hear You Speak: Breaking Audio CAPTCHAs Using OTS Speech RecognitionSaumya Solanki, Gautam Krishnan, Varshini Sampath, Jason Polakis. 69-80 [doi]
- Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way ForwardRam Shankar Siva Kumar, Andrew Wicker, Matt Swann. 81-90 [doi]
- Robust Linear Regression Against Training Data PoisoningChang Liu, Bo Li 0026, Yevgeniy Vorobeychik, Alina Oprea. 91-102 [doi]
- Mitigating Poisoning Attacks on Machine Learning Models: A Data Provenance Based ApproachNathalie Baracaldo, Bryant Chen, Heiko Ludwig, Jaehoon Amir Safavi. 103-110 [doi]
- Malware Classification and Class Imbalance via Stochastic Hashed LZJDEdward Raff, Charles Nicholas. 111-120 [doi]
- Learning the PE Header, Malware Detection with Minimal Domain KnowledgeEdward Raff, Jared Sylvester, Charles Nicholas. 121-132 [doi]