Abstract is missing.
- Label Sanitization Against Label Flipping Poisoning AttacksAndrea Paudice, Luis Muñoz-González, Emil C. Lupu. 5-15 [doi]
- Limitations of the Lipschitz Constant as a Defense Against Adversarial ExamplesTodd Huster, Cho-Yu Jason Chiang, Ritu Chadha. 16-29 [doi]
- Understanding Adversarial Space Through the Lens of AttributionMayank Singh 0007, Nupur Kumari, Abhishek Sinha, Balaji Krishnamurthy. 30-40 [doi]
- Detecting Potential Local Adversarial Examples for Human-Interpretable DefenseXavier Renard, Thibault Laugel, Marie-Jeanne Lesot, Christophe Marsala, Marcin Detyniecki. 41-47 [doi]
- Smart Cities with Deep EdgesGary White, Siobhán Clarke. 53-64 [doi]
- Computational Model for Urban Growth Using Socioeconomic Latent ParametersPiyush Yadav, Shamsuddin Ladha, Shailesh Deshpande, Edward Curry. 65-78 [doi]
- Object Geolocation from Crowdsourced Street Level ImageryVladimir A. Krylov, Rozenn Dahyot. 79-83 [doi]
- Extending Support Vector Regression to Constraint Optimization: Application to the Reduction of Potentially Avoidable HospitalizationsTu Ngo, Vera Georgescu, Carmen Gervet, Anne Laurent, Thérèse Libourel, Grégoire Mercier. 89-102 [doi]
- SALER: A Data Science Solution to Detect and Prevent Corruption in Public AdministrationFernando Martínez-Plumed, Juan Carlos Casamayor, César Ferri, Jon Ander Gómez, Eduardo Vendrell Vidal. 103-117 [doi]
- MaaSim: A Liveability Simulation for Improving the Quality of Life in CitiesDominika Woszczyk, Gerasimos Spanakis. 118-133 [doi]
- Designing Data-Driven Solutions to Societal Problems: Challenges and ApproachesJanardan Misra, Divya Rawat, Sanjay Podder. 134-144 [doi]
- Host Based Intrusion Detection System with Combined CNN/RNN ModelAshima Chawla, Brian Lee, Sheila Fallon, Paul Jacob. 149-158 [doi]
- Cyber Attacks Against the PC Learning AlgorithmEmad Alsuwat, Hatim Alsuwat, Marco Valtorta, Csilla Farkas. 159-176 [doi]
- Neural Networks in an Adversarial Setting and Ill-Conditioned Weight SpaceAbhishek Sinha, Mayank Singh 0007, Balaji Krishnamurthy. 177-190 [doi]
- Pseudo-Random Number Generation Using Generative Adversarial NetworksMarcello De Bernardi, M. H. R. Khouzani, Pasquale Malacaria. 191-200 [doi]
- Context Delegation for Context-Based Access ControlMouiad Al-Wahah, Csilla Farkas. 201-210 [doi]
- An Information Retrieval System for CBRNe IncidentsBrett Drury, Ihsan Ullah, Michael G. Madden. 211-215 [doi]
- A Virtual Testbed for Critical Incident Investigation with Autonomous Remote Aerial Vehicle Surveying, Artificial Intelligence, and Decision SupportIhsan Ullah, Sai Abinesh, David L. Smyth, Nazli B. Karimi, Brett Drury, Frank G. Glavin, Michael G. Madden. 216-221 [doi]
- Event Relevancy Pruning in Support of Energy-Efficient Sequential Pattern MiningPierre Dagnely, Tom Tourwé, Elena Tsiporkova. 227-242 [doi]
- How to Measure Energy Consumption in Machine Learning AlgorithmsEva García Martín, Niklas Lavesson, Håkan Grahn, Emiliano Casalicchio, Veselka Boeva. 243-255 [doi]