Abstract is missing.
- Where Does the Robustness Come from?: A Study of the Transformation-based Ensemble DefenceChang-Liao, Yao Cheng, Chengfang Fang, Jie Shi. 1-12 [doi]
- Towards Certifiable Adversarial Sample DetectionIlia Shumailov, Yiren Zhao, Robert D. Mullins, Ross J. Anderson. 13-24 [doi]
- E-ABS: Extending the Analysis-By-Synthesis Robust Classification Model to More Complex Image DomainsAn Ju, David A. Wagner 0001. 25-36 [doi]
- SCRAP: Synthetically Composed Replay Attacks vs. Adversarial Machine Learning Attacks against Mouse-based Biometric AuthenticationJesus Solano, Christian Lopez, Esteban Rivera, Alejandra Castelblanco, Lizzy Tengana, Martín Ochoa. 37-47 [doi]
- Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Malware AnalysisMichael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Bridget I. Haus, Eva Domschot, Ramyaa, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer. 49-60 [doi]
- The Robust Malware Detection Challenge and Greedy Random Accelerated Multi-Bit SearchSicco Verwer, Azqa Nadeem, Christian A. Hammerschmidt, Laurens Bliek, Abdullah Al-Dujaili, Una-May O'Reilly. 61-70 [doi]
- Automatic Yara Rule Generation Using BiclusteringEdward Raff, Richard Zak, Gary Lopez Munoz, William Fleming, Hyrum S. Anderson, Bobby Filar, Charles Nicholas, James Holt. 71-82 [doi]
- Flow-based Detection and Proxy-based Evasion of Encrypted Malware C2 TrafficCarlos Novo, Ricardo Morla. 83-91 [doi]
- eNNclave: Offline Inference with Model ConfidentialityAlexander Schlögl, Rainer Böhme. 93-104 [doi]
- Risk-based Authentication Based on Network Latency ProfilingEsteban Rivera, Lizzy Tengana, Jesus Solano, Alejandra Castelblanco, Christian Lopez, Martín Ochoa. 105-115 [doi]
- Disabling Backdoor and Identifying Poison Data by using Knowledge Distillation in Backdoor Attacks on Deep Neural NetworksKota Yoshida, Takeshi Fujino. 117-127 [doi]