default search action
14th AISec@CCS 2021: Virtual Event, Korea
- Nicholas Carlini, Ambra Demontis, Yizheng Chen:
AISec@CCS 2021: Proceedings of the 14th ACM Workshop on Artificial Intelligence and Security, Virtual Event, Republic of Korea, 15 November 2021. ACM 2021, ISBN 978-1-4503-8657-9 - Nicholas Carlini:
Session details: Session 1: Adversarial Machine Learning. - Antreas Dionysiou, Elias Athanasopoulos:
Unicode Evil: Evading NLP Systems Using Visual Similarities of Text Characters. 1-12 - Luke E. Richards, André T. Nguyen, Ryan Capps, Steven Forsyth, Cynthia Matuszek, Edward Raff:
Adversarial Transfer Attacks With Unknown Data and Class Overlap. 13-24 - Chawin Sitawarin, Supriyo Chakraborty, David A. Wagner:
SAT: Improving Adversarial Training via Curriculum-Based Loss Smoothing. 25-36 - Zhanyuan Zhang, Yizheng Chen, David A. Wagner:
SEAT: Similarity Encoder by Adversarial Training for Detecting Model Extraction Attack Queries. 37-48 - Akshaj Kumar Veldanda, Kang Liu, Benjamin Tan, Prashanth Krishnamurthy, Farshad Khorrami, Ramesh Karri, Brendan Dolan-Gavitt, Siddharth Garg:
NNoculation: Catching BadNets in the Wild. 49-60 - Nicholas Carlini:
Session details: Session 2A: Machine Learning for Cybersecurity. - Aviv Yehezkel, Eyal Elyashiv, Or Soffer:
Network Anomaly Detection Using Transfer Learning Based on Auto-Encoders Loss Normalization. 61-71 - Robert J. Joyce, Edward Raff, Charles Nicholas:
A Framework for Cluster and Classifier Evaluation in the Absence of Reference Labels. 73-84 - Chinmay Deshpande, David Gens, Michael Franz:
StackBERT: Machine Learning Assisted Static Stack Frame Size Recovery on Stripped and Optimized Binaries. 85-95 - Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao:
Patch-based Defenses against Web Fingerprinting Attacks. 97-109 - Ambra Demontis:
Session details: Session 2B: Machine Learning for Cybersecurity. - Giuseppina Andresini, Feargus Pendlebury, Fabio Pierazzi, Corrado Loglisci, Annalisa Appice, Lorenzo Cavallaro:
INSOMNIA: Towards Concept-Drift Robustness in Network Intrusion Detection. 111-122 - Zeliang Kan, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro:
Investigating Labelless Drift Adaptation for Malware Detection. 123-134 - Jan Malte Hilgefort, Daniel Arp, Konrad Rieck:
Spying through Virtual Backgrounds of Video Calls. 135-144 - Tom Ganz, Martin Härterich, Alexander Warnecke, Konrad Rieck:
Explaining Graph Neural Networks for Vulnerability Discovery. 145-156 - Kalle Kujanpää, Willie Victor, Alexander Ilin:
Automating Privilege Escalation with Deep Reinforcement Learning. 157-168 - Jan Peter Drees, Pritha Gupta, Eyke Hüllermeier, Tibor Jager, Alexander Konze, Claudia Priesterjahn, Arunselvan Ramaswamy, Juraj Somorovsky:
Automated Detection of Side Channels in Cryptographic Protocols: DROWN the ROBOTs! 169-180 - Yizheng Chen:
Session details: Session 3: Privacy-Preserving Machine Learning. - Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, James Joshi, Heiko Ludwig:
FedV: Privacy-Preserving Federated Learning over Vertically Partitioned Data. 181-192 - Shadi Rahimian, Tribhuvanesh Orekondy, Mario Fritz:
Differential Privacy Defenses and Sampling Attacks for Membership Inference. 193-202
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.