Backdoors pose a serious threat to machine learning, as they can comprom...
The number of papers submitted to academic conferences is steadily risin...
The source code of a program not only defines its semantics but also con...
Generative adversarial networks (GANs) have made remarkable progress in
...
Imagine interconnected objects with embedded artificial intelligence (AI...
Removing information from a machine learning model is a non-trivial task...
Physical isolation, so called air-gapping, is an effective method for
pr...
Machine learning-based systems for malware detection operate in a hostil...
With the growing processing power of computing systems and the increasin...
Backdoors and poisoning attacks are a major threat to the security of
ma...
For many, social networks have become the primary source of news, althou...
Camera sensor noise is one of the most reliable device characteristics i...
Deep learning is increasingly used as a basic building block of security...
In this paper, we present a novel attack against authorship attribution ...
Clustering algorithms have become a popular tool in computer security to...
With the introduction of memory-bound cryptocurrencies, such as Monero, ...
Taint-style vulnerabilities comprise a majority of fuzzer discovered pro...