Publications

2020

Journal articles

Blom, M.; Shekh, S.; Gossink, D.; Miller, T.; Pearce, AR. (2020) “Inventory routing for defense: Moving supplies in adversarial and partially observable environments” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology SAGE PUBLICATIONS INC. pp: 55-81. DOI:10.1177/1548512918798056

Jia, Y.; Bailey, J.; Ramamohanarao, K.; Leckie, C.; Ma, X. (2020) “Exploiting patterns to explain individual predictions” Knowledge and Information Systems London, United Kingdom. Springer London. pp: 927-950. DOI:10.1007/s10115-019-01368-9

Singh, R.; Miller, T.; Newn, J.; Velloso, E.; Vetere, F.; Sonenberg, L. (2020) “Combining gaze and AI planning for online human intention recognition” Artificial Intelligence Elsevier. pp: 103275-103275. DOI:10.1016/j.artint.2020.103275

Xingjun Ma, Yuhao Niu, Lin Gu, Yisen Wang, Yitian Zhao, James Bailey and Feng Lu. (2020) “Understanding Adversarial Attacks on Deep Learning Based Medical Image Analysis Systems”. To appear in Pattern Recognition.

Conference Papers

Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey and Xingjun Ma. (2020) Skip connections matter: on the transferability of adversarial examples generated with ResNets. Proceedings of the Eighth International Conference on Learning Representations (ICLR), Addis Ababa, Ethiopia.

Ranjie Duan, Xingjun Ma, Yisen Wang, James Bailey, Kai Qin, Yun Yang. (2020) Adversarial Camouflage: Hiding Adversarial Examples with Natural Styles. To appear in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, Washington.

Shihao Zhao, Xingjun Ma, Xiang Zheng, James Bailey, Jingjing Chen, Yu-Gang Jiang. (2020) Clean-Label Backdoor Attacks on Video Recognition Models. To appear in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, Washington.

Yisen Wang, Difan Zou, Jinfeng Yi, James Bailey, Xingjun Ma and Quanquan Gu. (2020) Improving Adversarial Robustness Requires Revisiting Misclassified Examples. Proceedings of the Eighth International Conference on Learning Representations (ICLR), Addis Ababa, Ethiopia.

Wang, Y.; Ma, X.; Chen, Z.; Luo, Y.; Yi, J.; Bailey, J. (2020) “Symmetric cross entropy for robust learning with noisy labels” 2019 IEEE/CVF International Conference on Computer Vision (ICCV) IEEE. pp: 322-330. DOI:10.1109/ICCV.2019.00041

2019

Books

Joseph, A.; Nelson, B.; Rubinstein, B.; Tygar, JD. (2019) “Adversarial Machine Learning”. Cambridge, United kingdom. Cambridge University Press. pp: -. DOI:10.1017/9781107338548

Journal articles

Gunning, D.; Stefik, M.; Choi, J.; Miller, T.; Stumpf, S.; Yang, G-Z. (2019) “XAI-Explainable artificial intelligence” Science Robotics Washington DC, United States. American Association for the Advancement of Science. pp: -. DOI:10.1126/scirobotics.aay7120

Hashem, T.; Kulik, L.; Ramamohanarao, K.; Zhang, R.; Soma, SC. (2019) “Protecting privacy for distance and rank based group nearest neighbor queries” World Wide Web SPRINGER. pp: 375-416. DOI:10.1007/s11280-018-0570-5

Miller, T. (2019) “Explanation in artificial intelligence: Insights from the social sciences” Artificial Intelligence Netherlands. ELSEVIER SCIENCE BV. pp: 1-38. DOI:10.1016/j.artint.2018.07.007

Weerasinghe, S.; Erfani, SM.; Alpcan, T.; Leckie, C. (2019) “Support vector machines resilient against training data integrity attacks” Pattern Recognition Amsterdam, Netherlands. Elsevier BV. pp: -. DOI:10.1016/j.patcog.2019.106985

Conference Papers

Alfeld, S.; Vartanian, A.; Newman-johnson, L.; Rubinstein, BIP. (2019) “Attacking Data Transforming Learners at Training Time” 33rd AAAI Conference on Artificial Intelligence / 31st Innovative Applications of Artificial Intelligence Conference / 9th AAAI Symposium on Educational Advances in Artificial Intelligence Palo Alto, California USA. Association for the Advancement of Artificial Intelligence. pp: 3167-3174. DOI:10.1609/aaai.v33i01.33013167

Ghane Ezabadi, S.; Jolfaei, A.; Kulik, L.; Kotagiri, R. (2019) “Differentially private streaming to untrusted edge servers in intelligent transportation system” 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) IEEE. pp: 781-786. DOI:10.1109/TrustCom/BigDataSE.2019.00113

Jia, Y.; Bailey, J.; Ramamohanarao, K.; Leckie, C.; Houle, ME. (2019) “Improving the quality of explanations with local embedding perturbations” 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining ACM. pp: 875-884. DOI:10.1145/3292500.3330930

Jiang, L.; Ma, X.; Chen, S.; Bailey, J.; Jiang, YG. (2019) “Black-box adversarial attacks on video recognition models” 27th ACM International Conference on Multimedia Association for Computing Machinery. pp: 864-872. DOI:10.1145/3343031.3351088

Roohi, L.; Rubinstein, BIP.; Teague, V. (2019) “Differentially-Private Two-Party Egocentric Betweenness Centrality” IEEE Conference on Computer Communications IEEE. pp: 2233-2241. DOI:10.1109/INFOCOM.2019.8737405

Sison, R.; Murray, T. (2019) “Verifying that a compiler preserves concurrent value-dependent information-flow security” 10th International Conference on Interactive Theorem Proving Schloss Dagstuhl. DOI:10.4230/LIPIcs.ITP.2019.27

Wang, Y.; Ma, X.; Bailey, J.; Yi, J.; Zhou, B.; Gu, Q. (2019) “On the convergence and robustness of adversarial training” 36th International Conference on Machine Learning, ICML 2019 PMLR. pp: 11426-11438.

Weerasinghe, S.; Erfani, SM.; Alpcan, T.; Leckie, C.; Riddle, J. (2019) “Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning” 43rd Conference on Local Computer Networks (LCN) IEEE. pp: 469-472. DOI:10.1109/LCN.2018.8638065

2018

Journal articles

Fanaeepour, M.; Rubinstein, BIP. (2018) “Differentially private counting of users' spatial regions” Knowledge and Information Systems SPRINGER LONDON LTD. pp: 5-32. DOI:10.1007/s10115-017-1113-6

Hoffman, R.; Miller, T.; Mueller, ST.; Klein, G.; Clancey, WJ. (2018) “Explaining Explanation, Part 4: A Deep Dive on Deep Nets” IEEE Intelligent Systems IEEE COMPUTER SOC. pp: 87-95. DOI:10.1109/MIS.2018.033001421

Tang, Z.; Kuijper, M.; Chong, M.; Mareels, I.; Leckie, C. (2018) “Sensor attack correction for linear systems with known inputs” IFAC-PapersOnLine Elsevier BV. pp: 206-211. DOI:10.1016/j.ifacol.2018.12.036

Conference Papers

Alpcan, T.; Weerasinghe, P.; Kuijper, M.; Monazam Erfani, S.; Leckie, C. (2018) “Unsupervised Adversarial Anomaly Detection using One-Class Support Vector Machines” 23rd International Symposium on Mathematical Theory of Networks and Systems Hong Kong University of Science and Technology.

Amsaleg, L.; Bailey, J.; Barbe, D.; Erfani, S.; Houle, ME.; Nguyen, V.; Radovanovic, M. (2018) “The vulnerability of learning to adversarial perturbation increases with intrinsic dimensionality” Workshop on Information Forensics and Security IEEE Explore. pp: 1-6. DOI:10.1109/WIFS.2017.8267651

Ghane, S.; Kulik, L.; Ramamohanarao, K. (2018) “Publishing spatial histograms under differential privacy” International Conference on Scientific and Statistical Data Base Management New York, NY, USA. ACM Press. DOI:10.1145/3221269.3223039

Han, Y.; Rubinstein, BIP.; Abraham, T.; Alpcan, T.; De Vel, O.; Erfani, S.; Hubczenko, D.; Leckie, C.; Montague, P. (2018) “Reinforcement learning for autonomous defence in software-defined networking” Bushnell, L.; Poovendran, R.; Basar, T. (Ed.) Decision and Game Theory for Security Springer. pp: 145-165. DOI:10.1007/978-3-030-01554-1_9

Hayes, J.; Ohrimenko, O. (2018) “Contamination attacks and mitigation in multi-party machine learning” pp: 6604-6615.

Kamara, S.; Moataz, T.; Ohrimenko, O. (2018) “Structured encryption and leakage suppression” Springer International Publishing. pp: 339-370. DOI:10.1007/978-3-319-96884-1_12

Leckie, C.; Tang, Z.; Kuijper, M.; Mareels, I. (2018) “Attack correction for noise-free linear systems subject to sensor attacks” 23rd International Symposium on Mathematical Theory of Networks and Systems (MTNS) Hong Kong University of Science and Technology. pp: 18-21.

Ma, X.; Li, B.; Wang, Y.; M. Erfani, S.; Wijewickrema, S.; Schoenebeck, G.; Song, D.; Houle, ME.; Bailey, J. (2018) “Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality” International Conference on Learning Representations (ICLR) ICLR.

Ma, X.; Wang, Y.; Houle, ME.; Zhou, S.; Erfani, SM.; Xia, S-T.; Wijewickrema, S.; Bailey, J. (2018) “Dimensionality-Driven Learning with Noisy Labels” International Conference on Machine Learning (ICML) JMLR. pp: 5332-5341.

Macnally, AM.; Lipovetzky, N.; Ramirez, M.; Pearce, AR. (2018) “Action Selection for Transparent Planning” International Conference on Autonomous Agents and Multiagent Systems IFAAMAS International Foundation for Autonomous Agents and Multiagent Systems. pp: 1327-1335.

Sandamal Weerasinghe, Tansu Alpcan, Sarah Erfani, Christopher Leckie, Peyam Pourbeik and Jack Riddle. (2018) Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks. International Conference on Decision and Game Theory for Security (GameSec).

Yisen Wang, Weiyang Liu, Xingjun Ma, James Bailey, Hongyuan Zha, Le Song, Shu-Tao Xia. (2018) Iterative Learning with Open-set Noisy Labels. 30th IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 8688-8696, Salt Lake City, Utah, USA, June 18-22, 2018.

2017

Journal articles

Dimitrakakis, C.; Nelson, B.; Zhang, Z.; Mitrokotsa, A.; Rubinstein, BIP. (2017) “Differential Privacy for Bayesian Inference through Posterior Sampling” Journal of Machine Learning Research MICROTOME PUBL. pp: -.

Han, Y.; Chan, J.; Alpcan, T.; Leckie, C. (2017) “Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing” IEEE Transactions on Dependable and Secure Computing IEEE COMPUTER SOC. pp: 95-108. DOI:10.1109/TDSC.2015.2429132

Klein, G.; Andronick, J.; Keller, G.; Matichuk, D.; Murray, T.; O’Connor, L. (2017) “Provably trustworthy systems” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences ROYAL SOC. pp: -. DOI:10.1098/rsta.2015.0404

Conference Papers

Aldà, F.; Rubinstein, BIP. (2017) “The bernstein mechanism: Function release under differential privacy” 31st AAAI Conference on Artificial Intelligence, AAAI 2017 Unknown. pp: 1705-1711.

Ma, X.; Wijewickrema, S.; Zhou, Y.; Zhou, S.; O Leary, S.; Bailey, J. (2017) “Providing effective real-time feedback in simulation-based surgical training” International Conference on Medical Image Computing and Computer-Assisted Intervention SPRINGER. pp: 566-574. DOI:10.1007/978-3-319-66185-8_64