Quantum Privacy Aggregation of Teacher Ensembles (QPATE) for Privacy-preserving Quantum Machine Learning

Authors: William Watkins, Heehwan Wang, Sangyoon Bae, Huan-Hsin Tseng, Jiook Cha, Samuel Yen-Chi Chen, Shinjae Yoo | Published: 2024-01-15

A Novel Zero-Trust Machine Learning Green Architecture for Healthcare IoT Cybersecurity: Review, Analysis, and Implementation

Authors: Zag ElSayed, Nelly Elsayed, Sajjad Bay | Published: 2024-01-14

LookAhead: Preventing DeFi Attacks via Unveiling Adversarial Contracts

Authors: Shoupeng Ren, Lipeng He, Tianyu Tu, Di Wu, Jian Liu, Kui Ren, Chun Chen | Published: 2024-01-14 | Updated: 2025-04-02

Crafter: Facial Feature Crafting against Inversion-based Identity Theft on Deep Models

Authors: Shiming Wang, Zhe Ji, Liyao Xiang, Hao Zhang, Xinbing Wang, Chenghu Zhou, Bo Li | Published: 2024-01-14

Leveraging Machine Learning for Wi-Fi-based Environmental Continuous Two-Factor Authentication

Authors: Ali Abdullah S. AlQahtani, Thamraa Alshayeb, Mahmoud Nabil, Ahmad Patooghy | Published: 2024-01-12

Universal Vulnerabilities in Large Language Models: Backdoor Attacks for In-context Learning

Authors: Shuai Zhao, Meihuizi Jia, Luu Anh Tuan, Fengjun Pan, Jinming Wen | Published: 2024-01-11 | Updated: 2024-10-09

Binary Linear Tree Commitment-based Ownership Protection for Distributed Machine Learning

Authors: Tianxiu Xie, Keke Gai, Jing Yu, Liehuang Zhu | Published: 2024-01-11

Use of Graph Neural Networks in Aiding Defensive Cyber Operations

Authors: Shaswata Mitra, Trisha Chakraborty, Subash Neupane, Aritran Piplai, Sudip Mittal | Published: 2024-01-11

When eBPF Meets Machine Learning: On-the-fly OS Kernel Compartmentalization

Authors: Zicheng Wang, Tiejin Chen, Qinrun Dai, Yueqi Chen, Hua Wei, Qingkai Zeng | Published: 2024-01-11

A provable initialization and robust clustering method for general mixture models

Authors: Soham Jana, Jianqing Fan, Sanjeev Kulkarni | Published: 2024-01-10 | Updated: 2024-10-23