Network Cascade Vulnerability using Constrained Bayesian Optimization

Authors: Albert Lam, Mihai Anitescu, Anirudh Subramanyam | Published: 2023-04-27 | Updated: 2023-10-05

Killing Two Birds with One Stone: Quantization Achieves Privacy in Distributed Learning

Authors: Guangfeng Yan, Tan Li, Kui Wu, Linqi Song | Published: 2023-04-26

Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems

Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi | Published: 2023-04-26

Measuring and Modeling the Free Content Web

Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen | Published: 2023-04-26

C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference

Authors: Yuke Zhang, Dake Chen, Souvik Kundu, Haomei Liu, Ruiheng Peng, Peter A. Beerel | Published: 2023-04-26

Analyzing In-browser Cryptojacking

Authors: Muhammad Saad, David Mohaisen | Published: 2023-04-26

A Security Verification Framework of Cryptographic Protocols Using Machine Learning

Authors: Kentaro Ohno, Misato Nakabayashi | Published: 2023-04-26

(Local) Differential Privacy has NO Disparate Impact on Fairness

Authors: Héber H. Arcolezi, Karima Makhlouf, Catuscia Palamidessi | Published: 2023-04-25 | Updated: 2023-08-01

Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks

Authors: Ferheen Ayaz, Idris Zakariyya, José Cano, Sye Loong Keoh, Jeremy Singer, Danilo Pau, Mounia Kharbouche-Harrari | Published: 2023-04-25

Blockchain Large Language Models

Authors: Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais | Published: 2023-04-25 | Updated: 2023-04-29