New Secure Sparse Inner Product with Applications to Machine Learning

Authors: Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu | Published: 2022-10-16

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder

Authors: Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li | Published: 2022-10-16

Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability

Authors: Zhao Song, Yitan Wang, Zheng Yu, Lichen Zhang | Published: 2022-10-15 | Updated: 2023-06-06

Classification of Web Phishing Kits for early detection by platform providers

Authors: Andrea Venturi, Michele Colajanni, Marco Ramilli, Giorgio Valenziano Santangelo | Published: 2022-10-15

DI-NIDS: Domain Invariant Network Intrusion Detection System

Authors: Siamak Layeghy, Mahsa Baktashmotlagh, Marius Portmann | Published: 2022-10-15

An Embarrassingly Simple Backdoor Attack on Self-supervised Learning

Authors: Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang | Published: 2022-10-13 | Updated: 2023-08-14

DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models

Authors: Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang | Published: 2022-10-13 | Updated: 2023-01-09

Federated Learning for Tabular Data: Exploring Potential Risk to Privacy

Authors: Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel | Published: 2022-10-13

COLLIDER: A Robust Training Framework for Backdoor Data

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2022-10-13

Anomaly Detection via Federated Learning

Authors: Marc Vucovich, Amogh Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani | Published: 2022-10-12