Publications
2020
Journal articles
Blom, M.; Shekh, S.; Gossink, D.; Miller, T.; Pearce, AR. (2020) “Inventory routing for defense: Moving supplies in adversarial and partially observable environments” The Journal of Defense Modeling and Simulation: Applications, Methodology, Technology SAGE PUBLICATIONS INC. pp: 55-81. DOI:10.1177/1548512918798056
Jia, Y.; Bailey, J.; Ramamohanarao, K.; Leckie, C.; Ma, X. (2020) “Exploiting patterns to explain individual predictions” Knowledge and Information Systems London, United Kingdom. Springer London. pp: 927-950. DOI:10.1007/s10115-019-01368-9
Singh, R.; Miller, T.; Newn, J.; Velloso, E.; Vetere, F.; Sonenberg, L. (2020) “Combining gaze and AI planning for online human intention recognition” Artificial Intelligence Elsevier. pp: 103275-103275. DOI:10.1016/j.artint.2020.103275
Xingjun Ma, Yuhao Niu, Lin Gu, Yisen Wang, Yitian Zhao, James Bailey and Feng Lu. (2020) “Understanding Adversarial Attacks on Deep Learning Based Medical Image Analysis Systems”. To appear in Pattern Recognition.
Conference Papers
Dongxian Wu, Yisen Wang, Shu-Tao Xia, James Bailey and Xingjun Ma. (2020) Skip connections matter: on the transferability of adversarial examples generated with ResNets. Proceedings of the Eighth International Conference on Learning Representations (ICLR), Addis Ababa, Ethiopia.
Ranjie Duan, Xingjun Ma, Yisen Wang, James Bailey, Kai Qin, Yun Yang. (2020) Adversarial Camouflage: Hiding Adversarial Examples with Natural Styles. To appear in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, Washington.
Shihao Zhao, Xingjun Ma, Xiang Zheng, James Bailey, Jingjing Chen, Yu-Gang Jiang. (2020) Clean-Label Backdoor Attacks on Video Recognition Models. To appear in Proceedings of the IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), Seattle, Washington.
Yisen Wang, Difan Zou, Jinfeng Yi, James Bailey, Xingjun Ma and Quanquan Gu. (2020) Improving Adversarial Robustness Requires Revisiting Misclassified Examples. Proceedings of the Eighth International Conference on Learning Representations (ICLR), Addis Ababa, Ethiopia.
Wang, Y.; Ma, X.; Chen, Z.; Luo, Y.; Yi, J.; Bailey, J. (2020) “Symmetric cross entropy for robust learning with noisy labels” 2019 IEEE/CVF International Conference on Computer Vision (ICCV) IEEE. pp: 322-330. DOI:10.1109/ICCV.2019.00041
2019
Books
Joseph, A.; Nelson, B.; Rubinstein, B.; Tygar, JD. (2019) “Adversarial Machine Learning”. Cambridge, United kingdom. Cambridge University Press. pp: -. DOI:10.1017/9781107338548
Journal articles
Gunning, D.; Stefik, M.; Choi, J.; Miller, T.; Stumpf, S.; Yang, G-Z. (2019) “XAI-Explainable artificial intelligence” Science Robotics Washington DC, United States. American Association for the Advancement of Science. pp: -. DOI:10.1126/scirobotics.aay7120
Hashem, T.; Kulik, L.; Ramamohanarao, K.; Zhang, R.; Soma, SC. (2019) “Protecting privacy for distance and rank based group nearest neighbor queries” World Wide Web SPRINGER. pp: 375-416. DOI:10.1007/s11280-018-0570-5
Miller, T. (2019) “Explanation in artificial intelligence: Insights from the social sciences” Artificial Intelligence Netherlands. ELSEVIER SCIENCE BV. pp: 1-38. DOI:10.1016/j.artint.2018.07.007
Weerasinghe, S.; Erfani, SM.; Alpcan, T.; Leckie, C. (2019) “Support vector machines resilient against training data integrity attacks” Pattern Recognition Amsterdam, Netherlands. Elsevier BV. pp: -. DOI:10.1016/j.patcog.2019.106985
Conference Papers
Alfeld, S.; Vartanian, A.; Newman-johnson, L.; Rubinstein, BIP. (2019) “Attacking Data Transforming Learners at Training Time” 33rd AAAI Conference on Artificial Intelligence / 31st Innovative Applications of Artificial Intelligence Conference / 9th AAAI Symposium on Educational Advances in Artificial Intelligence Palo Alto, California USA. Association for the Advancement of Artificial Intelligence. pp: 3167-3174. DOI:10.1609/aaai.v33i01.33013167
Ghane Ezabadi, S.; Jolfaei, A.; Kulik, L.; Kotagiri, R. (2019) “Differentially private streaming to untrusted edge servers in intelligent transportation system” 2019 18th IEEE International Conference On Trust, Security And Privacy In Computing And Communications/13th IEEE International Conference On Big Data Science And Engineering (TrustCom/BigDataSE) IEEE. pp: 781-786. DOI:10.1109/TrustCom/BigDataSE.2019.00113
Jia, Y.; Bailey, J.; Ramamohanarao, K.; Leckie, C.; Houle, ME. (2019) “Improving the quality of explanations with local embedding perturbations” 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining ACM. pp: 875-884. DOI:10.1145/3292500.3330930
Jiang, L.; Ma, X.; Chen, S.; Bailey, J.; Jiang, YG. (2019) “Black-box adversarial attacks on video recognition models” 27th ACM International Conference on Multimedia Association for Computing Machinery. pp: 864-872. DOI:10.1145/3343031.3351088
Roohi, L.; Rubinstein, BIP.; Teague, V. (2019) “Differentially-Private Two-Party Egocentric Betweenness Centrality” IEEE Conference on Computer Communications IEEE. pp: 2233-2241. DOI:10.1109/INFOCOM.2019.8737405
Sison, R.; Murray, T. (2019) “Verifying that a compiler preserves concurrent value-dependent information-flow security” 10th International Conference on Interactive Theorem Proving Schloss Dagstuhl. DOI:10.4230/LIPIcs.ITP.2019.27
Wang, Y.; Ma, X.; Bailey, J.; Yi, J.; Zhou, B.; Gu, Q. (2019) “On the convergence and robustness of adversarial training” 36th International Conference on Machine Learning, ICML 2019 PMLR. pp: 11426-11438.
Weerasinghe, S.; Erfani, SM.; Alpcan, T.; Leckie, C.; Riddle, J. (2019) “Detection of Anomalous Communications with SDRs and Unsupervised Adversarial Learning” 43rd Conference on Local Computer Networks (LCN) IEEE. pp: 469-472. DOI:10.1109/LCN.2018.8638065
2018
Journal articles
Fanaeepour, M.; Rubinstein, BIP. (2018) “Differentially private counting of users' spatial regions” Knowledge and Information Systems SPRINGER LONDON LTD. pp: 5-32. DOI:10.1007/s10115-017-1113-6
Hoffman, R.; Miller, T.; Mueller, ST.; Klein, G.; Clancey, WJ. (2018) “Explaining Explanation, Part 4: A Deep Dive on Deep Nets” IEEE Intelligent Systems IEEE COMPUTER SOC. pp: 87-95. DOI:10.1109/MIS.2018.033001421
Tang, Z.; Kuijper, M.; Chong, M.; Mareels, I.; Leckie, C. (2018) “Sensor attack correction for linear systems with known inputs” IFAC-PapersOnLine Elsevier BV. pp: 206-211. DOI:10.1016/j.ifacol.2018.12.036
Conference Papers
Alpcan, T.; Weerasinghe, P.; Kuijper, M.; Monazam Erfani, S.; Leckie, C. (2018) “Unsupervised Adversarial Anomaly Detection using One-Class Support Vector Machines” 23rd International Symposium on Mathematical Theory of Networks and Systems Hong Kong University of Science and Technology.
Amsaleg, L.; Bailey, J.; Barbe, D.; Erfani, S.; Houle, ME.; Nguyen, V.; Radovanovic, M. (2018) “The vulnerability of learning to adversarial perturbation increases with intrinsic dimensionality” Workshop on Information Forensics and Security IEEE Explore. pp: 1-6. DOI:10.1109/WIFS.2017.8267651
Ghane, S.; Kulik, L.; Ramamohanarao, K. (2018) “Publishing spatial histograms under differential privacy” International Conference on Scientific and Statistical Data Base Management New York, NY, USA. ACM Press. DOI:10.1145/3221269.3223039
Han, Y.; Rubinstein, BIP.; Abraham, T.; Alpcan, T.; De Vel, O.; Erfani, S.; Hubczenko, D.; Leckie, C.; Montague, P. (2018) “Reinforcement learning for autonomous defence in software-defined networking” Bushnell, L.; Poovendran, R.; Basar, T. (Ed.) Decision and Game Theory for Security Springer. pp: 145-165. DOI:10.1007/978-3-030-01554-1_9
Hayes, J.; Ohrimenko, O. (2018) “Contamination attacks and mitigation in multi-party machine learning” pp: 6604-6615.
Kamara, S.; Moataz, T.; Ohrimenko, O. (2018) “Structured encryption and leakage suppression” Springer International Publishing. pp: 339-370. DOI:10.1007/978-3-319-96884-1_12
Leckie, C.; Tang, Z.; Kuijper, M.; Mareels, I. (2018) “Attack correction for noise-free linear systems subject to sensor attacks” 23rd International Symposium on Mathematical Theory of Networks and Systems (MTNS) Hong Kong University of Science and Technology. pp: 18-21.
Ma, X.; Li, B.; Wang, Y.; M. Erfani, S.; Wijewickrema, S.; Schoenebeck, G.; Song, D.; Houle, ME.; Bailey, J. (2018) “Characterizing Adversarial Subspaces Using Local Intrinsic Dimensionality” International Conference on Learning Representations (ICLR) ICLR.
Ma, X.; Wang, Y.; Houle, ME.; Zhou, S.; Erfani, SM.; Xia, S-T.; Wijewickrema, S.; Bailey, J. (2018) “Dimensionality-Driven Learning with Noisy Labels” International Conference on Machine Learning (ICML) JMLR. pp: 5332-5341.
Macnally, AM.; Lipovetzky, N.; Ramirez, M.; Pearce, AR. (2018) “Action Selection for Transparent Planning” International Conference on Autonomous Agents and Multiagent Systems IFAAMAS International Foundation for Autonomous Agents and Multiagent Systems. pp: 1327-1335.
Sandamal Weerasinghe, Tansu Alpcan, Sarah Erfani, Christopher Leckie, Peyam Pourbeik and Jack Riddle. (2018) Deep Learning Based Game-Theoretical Approach to Evade Jamming Attacks. International Conference on Decision and Game Theory for Security (GameSec).
Yisen Wang, Weiyang Liu, Xingjun Ma, James Bailey, Hongyuan Zha, Le Song, Shu-Tao Xia. (2018) Iterative Learning with Open-set Noisy Labels. 30th IEEE/CVF Conference on Computer Vision and Pattern Recognition (CVPR), pages 8688-8696, Salt Lake City, Utah, USA, June 18-22, 2018.
2017
Journal articles
Dimitrakakis, C.; Nelson, B.; Zhang, Z.; Mitrokotsa, A.; Rubinstein, BIP. (2017) “Differential Privacy for Bayesian Inference through Posterior Sampling” Journal of Machine Learning Research MICROTOME PUBL. pp: -.
Han, Y.; Chan, J.; Alpcan, T.; Leckie, C. (2017) “Using Virtual Machine Allocation Policies to Defend against Co-Resident Attacks in Cloud Computing” IEEE Transactions on Dependable and Secure Computing IEEE COMPUTER SOC. pp: 95-108. DOI:10.1109/TDSC.2015.2429132
Klein, G.; Andronick, J.; Keller, G.; Matichuk, D.; Murray, T.; O’Connor, L. (2017) “Provably trustworthy systems” Philosophical Transactions of the Royal Society A: Mathematical, Physical and Engineering Sciences ROYAL SOC. pp: -. DOI:10.1098/rsta.2015.0404
Conference Papers
Aldà, F.; Rubinstein, BIP. (2017) “The bernstein mechanism: Function release under differential privacy” 31st AAAI Conference on Artificial Intelligence, AAAI 2017 Unknown. pp: 1705-1711.
Ma, X.; Wijewickrema, S.; Zhou, Y.; Zhou, S.; O Leary, S.; Bailey, J. (2017) “Providing effective real-time feedback in simulation-based surgical training” International Conference on Medical Image Computing and Computer-Assisted Intervention SPRINGER. pp: 566-574. DOI:10.1007/978-3-319-66185-8_64