Enhancing Security in Blockchain Networks: Anomalies, Frauds, and Advanced Detection Techniques

Authors: Joerg Osterrieder, Stephen Chan, Jeffrey Chu, Yuanyuan Zhang, Branka Hadji Misheva, Codruta Mare | Published: 2024-02-17

On the Role of Similarity in Detecting Masquerading Files

Authors: Jonathan Oliver, Jue Mo, Susmit Yenkar, Raghav Batta, Sekhar Josyoula | Published: 2024-02-17

Neural Networks with (Low-Precision) Polynomial Approximations: New Insights and Techniques for Accuracy Improvement

Authors: Chi Zhang, Jingjing Fan, Man Ho Au, Siu Ming Yiu | Published: 2024-02-17 | Updated: 2024-06-07

DART: A Principled Approach to Adversarially Robust Unsupervised Domain Adaptation

Authors: Yunjuan Wang, Hussein Hazimeh, Natalia Ponomareva, Alexey Kurakin, Ibrahim Hammoud, Raman Arora | Published: 2024-02-16

Private PAC Learning May be Harder than Online Learning

Authors: Mark Bun, Aloni Cohen, Rathin Desai | Published: 2024-02-16

Using Hallucinations to Bypass GPT4’s Filter

Authors: Benjamin Lemkin | Published: 2024-02-16 | Updated: 2024-03-11

On the Impact of Uncertainty and Calibration on Likelihood-Ratio Membership Inference Attacks

Authors: Meiyi Zhu, Caili Guo, Chunyan Feng, Osvaldo Simeone | Published: 2024-02-16 | Updated: 2025-03-14

Privacy for Fairness: Information Obfuscation for Fair Representation Learning with Local Differential Privacy

Authors: Songjie Xie, Youlong Wu, Jiaxuan Li, Ming Ding, Khaled B. Letaief | Published: 2024-02-16

Measuring and Reducing LLM Hallucination without Gold-Standard Answers

Authors: Jiaheng Wei, Yuanshun Yao, Jean-Francois Ton, Hongyi Guo, Andrew Estornell, Yang Liu | Published: 2024-02-16 | Updated: 2024-06-06

A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets

Authors: Irina Arévalo, Jose L. Salmeron | Published: 2024-02-15