Combining Generators of Adversarial Malware Examples to Increase Evasion Rate

Authors: Matouš Kozák, Martin Jureček | Published: 2023-04-14

Automated Mapping of CVE Vulnerability Records to MITRE CWE Weaknesses

Authors: Ashraf Haddad, Najwa Aaraj, Preslav Nakov, Septimiu Fabian Mare | Published: 2023-04-13

Understanding Overfitting in Adversarial Training via Kernel Regression

Authors: Teng Zhang, Kang Li | Published: 2023-04-13 | Updated: 2023-04-19

Exploiting Logic Locking for a Neural Trojan Attack on Machine Learning Accelerators

Authors: Hongye Xu, Dongfang Liu, Cory Merkel, Michael Zuzak | Published: 2023-04-12 | Updated: 2023-04-14

Zero-Knowledge Proof-based Practical Federated Learning on Blockchain

Authors: Zhibo Xing, Zijian Zhang, Meng Li, Jiamou Liu, Liehuang Zhu, Giovanni Russello, Muhammad Rizwan Asghar | Published: 2023-04-12 | Updated: 2023-04-24

RRHF: Rank Responses to Align Language Models with Human Feedback without tears

Authors: Zheng Yuan, Hongyi Yuan, Chuanqi Tan, Wei Wang, Songfang Huang, Fei Huang | Published: 2023-04-11 | Updated: 2023-10-07

Privacy-Preserving Matrix Factorization for Recommendation Systems using Gaussian Mechanism

Authors: Sohan Salahuddin Mugdho, Hafiz Imtiaz | Published: 2023-04-11

Multi-step Jailbreaking Privacy Attacks on ChatGPT

Authors: Haoran Li, Dadi Guo, Wei Fan, Mingshi Xu, Jie Huang, Fanpu Meng, Yangqiu Song | Published: 2023-04-11 | Updated: 2023-11-01

RecUP-FL: Reconciling Utility and Privacy in Federated Learning via User-configurable Privacy Defense

Authors: Yue Cui, Syed Irfan Ali Meerza, Zhuohang Li, Luyang Liu, Jiaxin Zhang, Jian Liu | Published: 2023-04-11

Balancing Privacy and Performance for Private Federated Learning Algorithms

Authors: Xiangjian Hou, Sarit Khirirat, Mohammad Yaqub, Samuel Horvath | Published: 2023-04-11 | Updated: 2023-08-18