Gradient-based Uncertainty Attribution for Explainable Bayesian Deep Learning

Authors: Hanjing Wang, Dhiraj Joshi, Shiqiang Wang, Qiang Ji | Published: 2023-04-10

Reinforcement Learning-Based Black-Box Model Inversion Attacks

Authors: Gyojin Han, Jaehyun Choi, Haeil Lee, Junmo Kim | Published: 2023-04-10

Ransomware Detection and Classification Strategies

Authors: Aldin Vehabovic, Nasir Ghani, Elias Bou-Harb, Jorge Crichigno, Aysegul Yayimli | Published: 2023-04-10

Certifiable Black-Box Attacks with Randomized Adversarial Examples: Breaking Defenses with Provable Confidence

Authors: Hanbin Hong, Xinyu Zhang, Binghui Wang, Zhongjie Ba, Yuan Hong | Published: 2023-04-10 | Updated: 2024-09-06

Gradient Sparsification for Efficient Wireless Federated Learning with Differential Privacy

Authors: Kang Wei, Jun Li, Chuan Ma, Ming Ding, Feng Shu, Haitao Zhao, Wen Chen, Hongbo Zhu | Published: 2023-04-09 | Updated: 2023-12-21

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms

Authors: Zihao Wang, Vrizlynn L. L. Thing | Published: 2023-04-07

SCART: Simulation of Cyber Attacks for Real-Time

Authors: Kfir Girstein, Eliron Rahimi, Avi Mendelson | Published: 2023-04-07

AI Model Disgorgement: Methods and Choices

Authors: Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto | Published: 2023-04-07

Does Prompt-Tuning Language Model Ensure Privacy?

Authors: Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine | Published: 2023-04-07 | Updated: 2023-04-15