Privacy-Preserving Graph Machine Learning from Data to Computation: A Survey

Authors: Dongqi Fu, Wenxuan Bao, Ross Maciejewski, Hanghang Tong, Jingrui He | Published: 2023-07-10

Robust Ranking Explanations

Authors: Chao Chen, Chenghua Guo, Guixiang Ma, Ming Zeng, Xi Zhang, Sihong Xie | Published: 2023-07-08

Bounding data reconstruction attacks with the hypothesis testing interpretation of differential privacy

Authors: Georgios Kaissis, Jamie Hayes, Alexander Ziller, Daniel Rueckert | Published: 2023-07-08

A Natural Language Processing Approach to Malware Classification

Authors: Ritik Mehta, Olha Jurečková, Mark Stamp | Published: 2023-07-07

Convergence of Communications, Control, and Machine Learning for Secure and Autonomous Vehicle Navigation

Authors: Tengchan Zeng, Aidin Ferdowsi, Omid Semiari, Walid Saad, Choong Seon Hong | Published: 2023-07-05

Jailbroken: How Does LLM Safety Training Fail?

Authors: Alexander Wei, Nika Haghtalab, Jacob Steinhardt | Published: 2023-07-05

Vulnerable Source Code Detection using SonarCloud Code Analysis

Authors: Alifia Puspaningrum, Muhammad Anis Al Hilmi, Darsih, Muhamad Mustamiin, Maulana Ilham Ginanjar | Published: 2023-07-05

An Algorithm for Persistent Homology Computation Using Homomorphic Encryption

Authors: Dominic Gold, Koray Karabina, Francis C. Motta | Published: 2023-07-04

ProPILE: Probing Privacy Leakage in Large Language Models

Authors: Siwon Kim, Sangdoo Yun, Hwaran Lee, Martin Gubri, Sungroh Yoon, Seong Joon Oh | Published: 2023-07-04

Approximate, Adapt, Anonymize (3A): a Framework for Privacy Preserving Training Data Release for Machine Learning

Authors: Tamas Madl, Weijie Xu, Olivia Choudhury, Matthew Howard | Published: 2023-07-04