Attack Tree Analysis for Adversarial Evasion Attacks

Authors: Yuki Yamaguchi, Toshiaki Aoki | Published: 2023-12-28

Layer Attack Unlearning: Fast and Accurate Machine Unlearning via Layer Level Attack and Knowledge Distillation

Authors: Hyunjune Kim, Sangyong Lee, Simon S. Woo | Published: 2023-12-28

Anticipated Network Surveillance — An extrapolated study to predict cyber-attacks using Machine Learning and Data Analytics

Authors: Aviral Srivastava, Dhyan Thakkar, Sharda Valiveti, Pooja Shah, Gaurang Raval | Published: 2023-12-27

Smuche: Scalar-Multiplicative Caching in Homomorphic Encryption

Authors: Dongfang Zhao | Published: 2023-12-26

Robust Survival Analysis with Adversarial Regularization

Authors: Michael Potter, Stefano Maxenti, Michael Everett | Published: 2023-12-26 | Updated: 2024-09-19

Reinforcement Unlearning

Authors: Dayong Ye, Tianqing Zhu, Congcong Zhu, Derui Wang, Kun Gao, Zewei Shi, Sheng Shen, Wanlei Zhou, Minhui Xue | Published: 2023-12-26 | Updated: 2024-09-09

SecQA: A Concise Question-Answering Dataset for Evaluating Large Language Models in Computer Security

Authors: Zefang Liu | Published: 2023-12-26

An Empirical Study of Efficiency and Privacy of Federated Learning Algorithms

Authors: Sofia Zahri, Hajar Bennouri, Ahmed M. Abdelmoniem | Published: 2023-12-24

SODA: Protecting Proprietary Information in On-Device Machine Learning Models

Authors: Akanksha Atrey, Ritwik Sinha, Saayan Mitra, Prashant Shenoy | Published: 2023-12-22

Robustness, Efficiency, or Privacy: Pick Two in Machine Learning

Authors: Youssef Allouah, Rachid Guerraoui, John Stephan | Published: 2023-12-22 | Updated: 2024-03-11