GTree: GPU-Friendly Privacy-preserving Decision Tree Training and Inference

Authors: Qifan Wang, Shujie Cui, Lei Zhou, Ye Dong, Jianli Bai, Yun Sing Koh, Giovanni Russello | Published: 2023-05-01 | Updated: 2024-08-14

SoK: Pragmatic Assessment of Machine Learning for Network Intrusion Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Johannes Schneider | Published: 2023-04-30

Can deepfakes be created by novice users?

Authors: Pulak Mehta, Gauri Jagatap, Kevin Gallagher, Brian Timmerman, Progga Deb, Siddharth Garg, Rachel Greenstadt, Brendan Dolan-Gavitt | Published: 2023-04-28

SHATTER: Control and Defense-Aware Attack Analytics for Activity-Driven Smart Home Systems

Authors: Nur Imtiazul Haque, Maurice Ngouen, Mohammad Ashiqur Rahman, Selcuk Uluagac, Laurent Njilla | Published: 2023-04-27

Machine Learning for Detection and Mitigation of Web Vulnerabilities and Web Attacks

Authors: Mahnoor Shahid | Published: 2023-04-27

Private Information Retrieval and Its Applications: An Introduction, Open Problems, Future Directions

Authors: Sajani Vithana, Zhusheng Wang, Sennur Ulukus | Published: 2023-04-27

Network Cascade Vulnerability using Constrained Bayesian Optimization

Authors: Albert Lam, Mihai Anitescu, Anirudh Subramanyam | Published: 2023-04-27 | Updated: 2023-10-05

Killing Two Birds with One Stone: Quantization Achieves Privacy in Distributed Learning

Authors: Guangfeng Yan, Tan Li, Kui Wu, Linqi Song | Published: 2023-04-26

Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems

Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi | Published: 2023-04-26

Measuring and Modeling the Free Content Web

Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen | Published: 2023-04-26