Abstract is missing.
- A Hybrid Approach to Privacy-Preserving Federated LearningStacey Truex, Nathalie Baracaldo, Ali Anwar, Thomas Steinke, Heiko Ludwig, Rui Zhang, Yi Zhou. 1-11 [doi]
- HybridAlpha: An Efficient Approach for Privacy-Preserving Federated LearningRunhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Heiko Ludwig. 13-23 [doi]
- Robust Detection of Obfuscated Strings in Android AppsAlireza Mohammadinodooshan, Ulf Kargén, Nahid Shahmehri. 25-35 [doi]
- Malware Detection on Highly Imbalanced Data through Sequence ModelingRajvardhan Oak, Min Du, David Yan, Harshvardhan C. Takawale, Idan Amit. 37-48 [doi]
- Risk Prioritization by Leveraging Latent Vulnerability Features in a Contested EnvironmentKenneth Alperin, Allan B. Wollaber, Dennis M. Ross, Pierre C. Trepagnier, Leslie Leonard. 49-57 [doi]
- Cross-Vendor Knowledge Transfer for Managed Security Services with Triplet NetworkToshiki Shibahara, Hirokazu Kodera, Daiki Chiba 0001, Mitsuaki Akiyama, Kunio Hato, Ola Söderström, Daniel Dalek, Masayuki Murata. 59-69 [doi]
- CADENCE: Conditional Anomaly Detection for Events Using Noise-Contrastive EstimationMohammad Ruhul Amin, Pranav Garg, Baris Coskun. 71-82 [doi]
- Making Targeted Black-box Evasion Attacks Effective and EfficientMika Juuti, Buse Gul Atli, N. Asokan. 83-94 [doi]
- Interpolated Adversarial Training: Achieving Robust Neural Networks Without Sacrificing Too Much AccuracyAlex Lamb, Vikas Verma, Juho Kannala, Yoshua Bengio. 95-103 [doi]
- Analyzing the Robustness of Open-World Machine LearningVikash Sehwag, Arjun Nitin Bhagoji, Liwei Song, Chawin Sitawarin, Daniel Cullina, Mung Chiang, Prateek Mittal. 105-116 [doi]