The privacy issue of counterfactual explanations: explanation linkage attacks

Authors: Sofie Goethals, Kenneth Sörensen, David Martens | Published: 2022-10-21

Evolution of Neural Tangent Kernels under Benign and Adversarial Training

Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21

Extracted BERT Model Leaks More Information than You Think!

Authors: Xuanli He, Chen Chen, Lingjuan Lyu, Qiongkai Xu | Published: 2022-10-21 | Updated: 2022-10-31

New data poison attacks on machine learning classifiers for mobile exfiltration

Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20

Do Software Security Practices Yield Fewer Vulnerabilities?

Authors: Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie Williams | Published: 2022-10-20 | Updated: 2023-06-15

Proof of Unlearning: Definitions and Instantiation

Authors: Jiasi Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang | Published: 2022-10-20 | Updated: 2022-10-21

How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers

Authors: Guangsheng Zhang, Bo Liu, Huan Tian, Tianqing Zhu, Ming Ding, Wanlei Zhou | Published: 2022-10-20 | Updated: 2024-02-02

A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends

Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07

Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries

Authors: Yuxin Wen, Arpit Bansal, Hamid Kazemi, Eitan Borgnia, Micah Goldblum, Jonas Geiping, Tom Goldstein | Published: 2022-10-19 | Updated: 2023-06-01

An Empirical Analysis of SMS Scam Detection Systems

Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar | Published: 2022-10-19