Abstract is missing.
- Session details: Session 3: Privacy-Preserving Machine LearningYizheng Chen. [doi]
- Session details: Session 2A: Machine Learning for CybersecurityNicholas Carlini. [doi]
- Session details: Session 1: Adversarial Machine LearningNicholas Carlini. [doi]
- Session details: Session 2B: Machine Learning for CybersecurityAmbra Demontis. [doi]
- Unicode Evil: Evading NLP Systems Using Visual Similarities of Text CharactersAntreas Dionysiou, Elias Athanasopoulos. 1-12 [doi]
- Adversarial Transfer Attacks With Unknown Data and Class OverlapLuke E. Richards, André T. Nguyen, Ryan Capps, Steven Forsyth, Cynthia Matuszek, Edward Raff. 13-24 [doi]
- SAT: Improving Adversarial Training via Curriculum-Based Loss SmoothingChawin Sitawarin, Supriyo Chakraborty, David A. Wagner 0001. 25-36 [doi]
- SEAT: Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack QueriesZhanyuan Zhang, Yizheng Chen, David A. Wagner 0001. 37-48 [doi]
- NNoculation: Catching BadNets in the WildAkshaj Kumar Veldanda, Kang Liu 0017, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt, Siddharth Garg. 49-60 [doi]
- Network Anomaly Detection Using Transfer Learning Based on Auto-Encoders Loss NormalizationAviv Yehezkel, Eyal Elyashiv, Or Soffer. 61-71 [doi]
- A Framework for Cluster and Classifier Evaluation in the Absence of Reference LabelsRobert J. Joyce, Edward Raff, Charles Nicholas. 73-84 [doi]
- StackBERT: Machine Learning Assisted Static Stack Frame Size Recovery on Stripped and Optimized BinariesChinmay Deshpande, David Gens, Michael Franz. 85-95 [doi]
- Patch-based Defenses against Web Fingerprinting AttacksShawn Shan, Arjun Nitin Bhagoji, Haitao Zheng 0001, Ben Y. Zhao. 97-109 [doi]
- INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion DetectionGiuseppina Andresini, Feargus Pendlebury, Fabio Pierazzi, Corrado Loglisci, Annalisa Appice, Lorenzo Cavallaro. 111-122 [doi]
- Investigating Labelless Drift Adaptation for Malware DetectionZeliang Kan, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro. 123-134 [doi]
- Spying through Virtual Backgrounds of Video CallsJan Malte Hilgefort, Daniel Arp, Konrad Rieck. 135-144 [doi]
- Explaining Graph Neural Networks for Vulnerability DiscoveryTom Ganz, Martin Härterich, Alexander Warnecke, Konrad Rieck. 145-156 [doi]
- Automating Privilege Escalation with Deep Reinforcement LearningKalle Kujanpää, Willie Victor, Alexander Ilin. 157-168 [doi]
- Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs!Jan Peter Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorovsky. 169-180 [doi]
- FedV: Privacy-Preserving Federated Learning over Vertically Partitioned DataRunhua Xu, Nathalie Baracaldo, Yi Zhou 0015, Ali Anwar 0001, James Joshi, Heiko Ludwig. 181-192 [doi]
- Differential Privacy Defenses and Sampling Attacks for Membership InferenceShadi Rahimian, Tribhuvanesh Orekondy, Mario Fritz. 193-202 [doi]