Topics · Papers
Machine learning
Detecting Structurally Anomalous Logins Within Enterprise NetworksHossein Siadati (New York University), Nasir Memon (New York University)
Machine Learning Models that Remember Too MuchCongzheng Song (Cornell University), Thomas Ristenpart (Cornell Tech), Vitaly Shmatikov (Cornell Tech)
Synthesis of Probabilistic Privacy EnforcementMartin Kucera (ETH Zürich), Petar Tsankov (ETH Zürich), Timon Gehr (ETH Zürich), Marco Guarnieri (ETH Zürich), Martin Vechev (ETH Zürich)
Practical Attacks Against Graph-based ClusteringYizheng Chen (Georgia Institute of Technology), Yacin Nadji (Georgia Institute of Technology), Athanasios Kountouras (Georgia Institute of Technology), Fabian Monrose (University of North Carolina at Chapel Hill), Roberto Perdisci (University of Georgia), Manos Antonakakis (Georgia Institute of Technology), Nikolaos Vasiloglou (Symantec)
walk2friends: Inferring Social Links from Mobility ProfilesMichael Backes (CISPA, Saarland University), Mathias Humbert (Swiss Data Science Center, ETH/EPFL), Jun Pang (University of Luxembourg), Yang Zhang (CISPA, Saarland University)
Evading Classifiers by Morphing in the DarkHung Dang (National University of Singapore), Yue Huang (National University of Singapore), Ee-Chien Chang (National University of Singapore)
Automated Crowdturfing Attacks and Defenses in Online Review SystemsYuanshun Yao (University of Chicago), Bimal Viswanath (University of Chicago), Jenna Cryan (University of Chicago), Haitao Zheng (University of Chicago), Ben Y. Zhao (University of Chicago)
Deep Models Under the GAN: Information Leakage from Collaborative Deep LearningBriland Hitaj (Stevens Institute of Technology), Giuseppe Ateniese (Stevens Institute of Technology), Fernando Perez-Cruz (Stevens Institute of Technology)
DeepLog: Anomaly Detection and Diagnosis from System Logs through Deep LearningMin Du (University of Utah), Feifei Li (University of Utah), Guineng Zheng (University of Utah), Vivek Srikumar (University of Utah)
Neural Network-based Graph Embedding for Cross-Platform Binary Code Similarity DetectionXiaojun Xu (Shanghai Jiao Tong University), Chang Liu (University of California, Berkeley), Qian Feng (Samsung Research America), Heng Yin (University of California, Riverside), Le Song (Georgia Institute of Technology), Dawn Song (University of California, Berkeley)
Predicting the Risk of Cyber IncidentsLeyla Bilge (Symantec Research Labs), Yufei Han (Symantec Research Labs), Matteo Dell’Amico (Symantec Research Labs)
POISED: Spotting Twitter Spam Off the Beaten PathsShirin Nilizadeh (University of California, Santa Barbara), François Labrèche (École Polytechnique de Montréal), Alireza Sadighian (École Polytechnique de Montréal), Ali Zand (University of California, Santa Barbara), José Fernandez (École Polytechnique de Montréal), Christopher Kruegel (University of California, Santa Barbara), Gianluca Stringhini (University College London), Giovanni Vigna (University of California, Santa Barbara)
Oblivious Neural Network Predictions via MiniONN transformationsJian Liu (Aalto University), Mika Juuti (Aalto University), Yao Lu (Aalto University), N. Asokan (Aalto University)
MagNet: a Two-Pronged Defense against Adversarial ExamplesDongyu Meng (ShanghaiTech University), Hao Chen (University of California, Davis)