


default search action
10th AISec@CCS 2017: Dallas, TX, USA
- Bhavani Thuraisingham, Battista Biggio, David Mandell Freeman, Brad Miller, Arunesh Sinha:

Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5202-4
Keynote Address
- Aylin Caliskan:

Beyond Big Data: What Can We Learn from AI Models?: Invited Keynote. 1
Deep Learning
- Nicholas Carlini, David A. Wagner:

Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. 3-14 - Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh:

ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models. 15-26 - Luis Muñoz-González

, Battista Biggio
, Ambra Demontis
, Andrea Paudice
, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli
:
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization. 27-38 - Valentina Zantedeschi, Maria-Irina Nicolae, Ambrish Rawat:

Efficient Defenses Against Adversarial Attacks. 39-49
Lightning Round
- Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu:

An Early Warning System for Suspicious Accounts. 51-52 - Daniel M. Bittner, Anand D. Sarwate

, Rebecca N. Wright:
Differentially Private Noisy Search with Applications to Anomaly Detection (Abstract). 53 - Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma:

Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism. 55-56
Authentication and Intrusion Detection
- Shuchu Han, Yifan Hu, Steven Skiena

, Baris Coskun, Meizhu Liu, Hong Qin, Jaime Perez:
Generating Look-alike Names For Security Challenges. 57-67 - Saumya Solanki, Gautam Krishnan, Varshini Sampath, Jason Polakis:

In (Cyber)Space Bots Can Hear You Speak: Breaking Audio CAPTCHAs Using OTS Speech Recognition. 69-80 - Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann:

Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward. 81-90
Defense against Poisoning
- Chang Liu, Bo Li, Yevgeniy Vorobeychik, Alina Oprea:

Robust Linear Regression Against Training Data Poisoning. 91-102 - Nathalie Baracaldo, Bryant Chen, Heiko Ludwig, Jaehoon Amir Safavi:

Mitigating Poisoning Attacks on Machine Learning Models: A Data Provenance Based Approach. 103-110
Malware
- Edward Raff

, Charles Nicholas:
Malware Classification and Class Imbalance via Stochastic Hashed LZJD. 111-120 - Edward Raff

, Jared Sylvester, Charles Nicholas:
Learning the PE Header, Malware Detection with Minimal Domain Knowledge. 121-132

manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.


Google
Google Scholar
Semantic Scholar
Internet Archive Scholar
CiteSeerX
ORCID














