A Dependable Hybrid Machine Learning Model for Network Intrusion Detection

Authors: Md. Alamin Talukder, Khondokar Fida Hasan, Md. Manowarul Islam, Md Ashraf Uddin, Arnisha Akhter, Mohammad Abu Yousuf, Fares Alharbi, Mohammad Ali Moni | Published: 2022-12-08 | Updated: 2023-01-27

XRand: Differentially Private Defense against Explanation-Guided Attacks

Authors: Truc Nguyen, Phung Lai, NhatHai Phan, My T. Thai | Published: 2022-12-08 | Updated: 2022-12-14

Vicious Classifiers: Assessing Inference-time Data Reconstruction Risk in Edge Computing

Authors: Mohammad Malekzadeh, Deniz Gunduz | Published: 2022-12-08 | Updated: 2024-10-01

RADAR: A TTP-based Extensible, Explainable, and Effective System for Network Traffic Analysis and Malware Detection

Authors: Yashovardhan Sharma, Simon Birnbach, Ivan Martinovic | Published: 2022-12-07 | Updated: 2023-04-13

Reconstructing Training Data from Model Gradient, Provably

Authors: Zihan Wang, Jason D. Lee, Qi Lei | Published: 2022-12-07 | Updated: 2023-06-10

Towards Fleet-wide Sharing of Wind Turbine Condition Information through Privacy-preserving Federated Learning

Authors: Lorin Jenkel, Stefan Jonas, Angela Meyer | Published: 2022-12-07 | Updated: 2023-07-12

On the Discredibility of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2022-12-06 | Updated: 2023-04-28

StyleGAN as a Utility-Preserving Face De-identification Method

Authors: Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh | Published: 2022-12-05 | Updated: 2023-08-31

Pareto Regret Analyses in Multi-objective Multi-armed Bandit

Authors: Mengfan Xu, Diego Klabjan | Published: 2022-12-01 | Updated: 2023-05-30

HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning

Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-01-22