C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference

Authors: Yuke Zhang, Dake Chen, Souvik Kundu, Haomei Liu, Ruiheng Peng, Peter A. Beerel | Published: 2023-04-26

Analyzing In-browser Cryptojacking

Authors: Muhammad Saad, David Mohaisen | Published: 2023-04-26

A Security Verification Framework of Cryptographic Protocols Using Machine Learning

Authors: Kentaro Ohno, Misato Nakabayashi | Published: 2023-04-26

(Local) Differential Privacy has NO Disparate Impact on Fairness

Authors: Héber H. Arcolezi, Karima Makhlouf, Catuscia Palamidessi | Published: 2023-04-25 | Updated: 2023-08-01

Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks

Authors: Ferheen Ayaz, Idris Zakariyya, José Cano, Sye Loong Keoh, Jeremy Singer, Danilo Pau, Mounia Kharbouche-Harrari | Published: 2023-04-25

Blockchain Large Language Models

Authors: Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais | Published: 2023-04-25 | Updated: 2023-04-29

SQLi Detection with ML: A data-source perspective

Authors: Balazs Pejo, Nikolett Kapui | Published: 2023-04-24

QuMoS: A Framework for Preserving Security of Quantum Machine Learning Model

Authors: Zhepeng Wang, Jinyang Li, Zhirui Hu, Blake Gage, Elizabeth Iwasawa, Weiwen Jiang | Published: 2023-04-23 | Updated: 2023-10-13

Identifying Appropriate Intellectual Property Protection Mechanisms for Machine Learning Models: A Systematization of Watermarking, Fingerprinting, Model Access, and Attacks

Authors: Isabell Lederer, Rudolf Mayer, Andreas Rauber | Published: 2023-04-22

ANALYSE — Learning to Attack Cyber-Physical Energy Systems With Intelligent Agents

Authors: Thomas Wolgast, Nils Wenninghoff, Stephan Balduin, Eric Veith, Bastian Fraune, Torben Woltjen, Astrid Nieße | Published: 2023-04-21