A Blockchain Solution for Collaborative Machine Learning over IoT

Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23

DPSUR: Accelerating Differentially Private Stochastic Gradient Descent Using Selective Update and Release

Authors: Jie Fu, Qingqing Ye, Haibo Hu, Zhili Chen, Lulu Wang, Kuncan Wang, Xun Ran | Published: 2023-11-23 | Updated: 2023-11-29

PrivateLoRA For Efficient Privacy Preserving LLM

Authors: Yiming Wang, Yu Lin, Xiaodong Zeng, Guannan Zhang | Published: 2023-11-23

Enhancing Intrusion Detection In Internet Of Vehicles Through Federated Learning

Authors: Abhishek Sebastian, Pragna R, Sudhakaran G, Renjith P N, Leela Karthikeyan H | Published: 2023-11-23

Acoustic Cybersecurity: Exploiting Voice-Activated Systems

Authors: Forrest McKee, David Noever | Published: 2023-11-23

Language Model Inversion

Authors: John X. Morris, Wenting Zhao, Justin T. Chiu, Vitaly Shmatikov, Alexander M. Rush | Published: 2023-11-22

Transfer Attacks and Defenses for Large Language Models on Coding Tasks

Authors: Chi Zhang, Zifan Wang, Ravi Mangal, Matt Fredrikson, Limin Jia, Corina Pasareanu | Published: 2023-11-22

How Far Have We Gone in Vulnerability Detection Using Large Language Models

Authors: Zeyu Gao, Hao Wang, Yuchen Zhou, Wenyu Zhu, Chao Zhang | Published: 2023-11-21 | Updated: 2023-12-22

DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction

Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique | Published: 2023-11-20

Enhancing IoT Security via Automatic Network Traffic Analysis: The Transition from Machine Learning to Deep Learning

Authors: Mounia Hamidouche, Eugeny Popko, Bassem Ouni | Published: 2023-11-20