Stop the war!
Остановите войну!
for scientists:
default search action
10th AISec@CCS 2017: Dallas, TX, USA
- Bhavani Thuraisingham, Battista Biggio, David Mandell Freeman, Brad Miller, Arunesh Sinha:
Proceedings of the 10th ACM Workshop on Artificial Intelligence and Security, AISec@CCS 2017, Dallas, TX, USA, November 3, 2017. ACM 2017, ISBN 978-1-4503-5202-4
Keynote Address
- Aylin Caliskan:
Beyond Big Data: What Can We Learn from AI Models?: Invited Keynote. 1
Deep Learning
- Nicholas Carlini, David A. Wagner:
Adversarial Examples Are Not Easily Detected: Bypassing Ten Detection Methods. 3-14 - Pin-Yu Chen, Huan Zhang, Yash Sharma, Jinfeng Yi, Cho-Jui Hsieh:
ZOO: Zeroth Order Optimization Based Black-box Attacks to Deep Neural Networks without Training Substitute Models. 15-26 - Luis Muñoz-González, Battista Biggio, Ambra Demontis, Andrea Paudice, Vasin Wongrassamee, Emil C. Lupu, Fabio Roli:
Towards Poisoning of Deep Learning Algorithms with Back-gradient Optimization. 27-38 - Valentina Zantedeschi, Maria-Irina Nicolae, Ambrish Rawat:
Efficient Defenses Against Adversarial Attacks. 39-49
Lightning Round
- Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu:
An Early Warning System for Suspicious Accounts. 51-52 - Daniel M. Bittner, Anand D. Sarwate, Rebecca N. Wright:
Differentially Private Noisy Search with Applications to Anomaly Detection (Abstract). 53 - Hiromu Yakura, Shinnosuke Shinozaki, Reon Nishimura, Yoshihiro Oyama, Jun Sakuma:
Malware Analysis of Imaged Binary Samples by Convolutional Neural Network with Attention Mechanism. 55-56
Authentication and Intrusion Detection
- Shuchu Han, Yifan Hu, Steven Skiena, Baris Coskun, Meizhu Liu, Hong Qin, Jaime Perez:
Generating Look-alike Names For Security Challenges. 57-67 - Saumya Solanki, Gautam Krishnan, Varshini Sampath, Jason Polakis:
In (Cyber)Space Bots Can Hear You Speak: Breaking Audio CAPTCHAs Using OTS Speech Recognition. 69-80 - Ram Shankar Siva Kumar, Andrew Wicker, Matt Swann:
Practical Machine Learning for Cloud Intrusion Detection: Challenges and the Way Forward. 81-90
Defense against Poisoning
- Chang Liu, Bo Li, Yevgeniy Vorobeychik, Alina Oprea:
Robust Linear Regression Against Training Data Poisoning. 91-102 - Nathalie Baracaldo, Bryant Chen, Heiko Ludwig, Jaehoon Amir Safavi:
Mitigating Poisoning Attacks on Machine Learning Models: A Data Provenance Based Approach. 103-110
Malware
- Edward Raff, Charles Nicholas:
Malware Classification and Class Imbalance via Stochastic Hashed LZJD. 111-120 - Edward Raff, Jared Sylvester, Charles Nicholas:
Learning the PE Header, Malware Detection with Minimal Domain Knowledge. 121-132
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.