ACM Conference on Computer and Communications Security

CCS 2017 - Papers on Machine learning

Topics · Papers

Machine learning

Detecting Structurally Anomalous Logins Within Enterprise Networks
Hossein Siadati (New York University), Nasir Memon (New York University)
[PDF]
Session: 2F
Machine Learning Models that Remember Too Much
Congzheng Song (Cornell University), Thomas Ristenpart (Cornell Tech), Vitaly Shmatikov (Cornell Tech)
[PDF]
Session: 3C
Synthesis of Probabilistic Privacy Enforcement
Martin Kucera (ETH Zürich), Petar Tsankov (ETH Zürich), Timon Gehr (ETH Zürich), Marco Guarnieri (ETH Zürich), Martin Vechev (ETH Zürich)
Practical Attacks Against Graph-based Clustering
Yizheng Chen (Georgia Institute of Technology), Yacin Nadji (Georgia Institute of Technology), Athanasios Kountouras (Georgia Institute of Technology), Fabian Monrose (University of North Carolina at Chapel Hill), Roberto Perdisci (University of Georgia), Manos Antonakakis (Georgia Institute of Technology), Nikolaos Vasiloglou (Symantec)
walk2friends: Inferring Social Links from Mobility Profiles
Michael Backes (CISPA, Saarland University), Mathias Humbert (Swiss Data Science Center, ETH/EPFL), Jun Pang (University of Luxembourg), Yang Zhang (CISPA, Saarland University)
Evading Classifiers by Morphing in the Dark
Hung Dang (National University of Singapore), Yue Huang (National University of Singapore), Ee-Chien Chang (National University of Singapore)
[PDF]
Session: 3A
Automated Crowdturfing Attacks and Defenses in Online Review Systems
Yuanshun Yao (University of Chicago), Bimal Viswanath (University of Chicago), Jenna Cryan (University of Chicago), Haitao Zheng (University of Chicago), Ben Y. Zhao (University of Chicago)
Deep Models Under the GAN: Information Leakage from Collaborative Deep Learning
Briland Hitaj (Stevens Institute of Technology), Giuseppe Ateniese (Stevens Institute of Technology), Fernando Perez-Cruz (Stevens Institute of Technology)
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep Learning
Min Du (University of Utah), Feifei Li (University of Utah), Guineng Zheng (University of Utah), Vivek Srikumar (University of Utah)
[PDF]
Session: 2F
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity Detection
Xiaojun Xu (Shanghai Jiao Tong University), Chang Liu (University of California, Berkeley), Qian Feng (Samsung Research America), Heng Yin (University of California, Riverside), Le Song (Georgia Institute of Technology), Dawn Song (University of California, Berkeley)
Predicting the Risk of Cyber Incidents
Leyla Bilge (Symantec Research Labs), Yufei Han (Symantec Research Labs), Matteo Dell’Amico (Symantec Research Labs)
[PDF]
Session: 2F
POISED: Spotting Twitter Spam Off the Beaten Paths
Shirin Nilizadeh (University of California, Santa Barbara), François Labrèche (École Polytechnique de Montréal), Alireza Sadighian (École Polytechnique de Montréal), Ali Zand (University of California, Santa Barbara), José Fernandez (École Polytechnique de Montréal), Christopher Kruegel (University of California, Santa Barbara), Gianluca Stringhini (University College London), Giovanni Vigna (University of California, Santa Barbara)
Oblivious Neural Network Predictions via MiniONN transformations
Jian Liu (Aalto University), Mika Juuti (Aalto University), Yao Lu (Aalto University), N. Asokan (Aalto University)
MagNet: a Two-Pronged Defense against Adversarial Examples
Dongyu Meng (ShanghaiTech University), Hao Chen (University of California, Davis)