A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets

Authors: Irina Arévalo, Jose L. Salmeron | Published: 2024-02-15

FedRDF: A Robust and Dynamic Aggregation Function against Poisoning Attacks in Federated Learning

Authors: Enrique Mármol Campos, Aurora González Vidal, José Luis Hernández Ramos, Antonio Skarmeta | Published: 2024-02-15

How Much Does Each Datapoint Leak Your Privacy? Quantifying the Per-datum Membership Leakage

Authors: Achraf Azize, Debabrota Basu | Published: 2024-02-15

On the Cross-Dataset Generalization of Machine Learning for Network Intrusion Detection

Authors: Marco Cantone, Claudio Marrocco, Alessandro Bria | Published: 2024-02-15

Utilizing Deep Learning for Enhancing Network Resilience in Finance

Authors: Yulu Gong, Mengran Zhu, Shuning Huo, Yafei Xiang, Hanyi Yu | Published: 2024-02-15 | Updated: 2024-02-18

An advanced data fabric architecture leveraging homomorphic encryption and federated learning

Authors: Sakib Anwar Rieyan, Md. Raisul Kabir News, A. B. M. Muntasir Rahman, Sadia Afrin Khan, Sultan Tasneem Jawad Zaarif, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan, Michele Ianni, Giancarlo Fortino | Published: 2024-02-15

AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns

Authors: Ashfak Md Shibli, Mir Mehedi A. Pritom, Maanak Gupta | Published: 2024-02-15

DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated Learning as a Service

Authors: Yu Liu, Zibo Wang, Yifei Zhu, Chen Chen | Published: 2024-02-15

PAL: Proxy-Guided Black-Box Attack on Large Language Models

Authors: Chawin Sitawarin, Norman Mu, David Wagner, Alexandre Araujo | Published: 2024-02-15

Why Does Differential Privacy with Large Epsilon Defend Against Practical Membership Inference Attacks?

Authors: Andrew Lowy, Zhuohang Li, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang | Published: 2024-02-14