Information-Based Sensor Placement for Data-Driven Estimation of Unsteady Flows

Authors: John Graff, Albert Medina, Francis Lagor | Published: 2023-03-22

DRSM: De-Randomized Smoothing on Malware Classifier Providing Certified Robustness

Authors: Shoumik Saha, Wenxiao Wang, Yigitcan Kaya, Soheil Feizi, Tudor Dumitras | Published: 2023-03-20 | Updated: 2023-10-03

It Is All About Data: A Survey on the Effects of Data on Adversarial Robustness

Authors: Peiyu Xiong, Michael Tegegn, Jaskeerat Singh Sarin, Shubhraneel Pal, Julia Rubin | Published: 2023-03-17 | Updated: 2023-10-17

The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion Models

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2023-03-15 | Updated: 2024-01-11

Score Attack: A Lower Bound Technique for Optimal Differentially Private Learning

Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2023-03-13

A Survey on Explainable Artificial Intelligence for Cybersecurity

Authors: Gaith Rjoub, Jamal Bentahar, Omar Abdel Wahab, Rabeb Mizouni, Alyssa Song, Robin Cohen, Hadi Otrok, Azzam Mourad | Published: 2023-03-07 | Updated: 2023-06-11

Exploring the Limits of Model-Targeted Indiscriminate Data Poisoning Attacks

Authors: Yiwei Lu, Gautam Kamath, Yaoliang Yu | Published: 2023-03-07 | Updated: 2023-06-06

Certified Robust Neural Networks: Generalization and Corruption Resistance

Authors: Amine Bennouna, Ryan Lucas, Bart Van Parys | Published: 2023-03-03 | Updated: 2023-05-18

Automated Machine Learning for Deep Learning based Malware Detection

Authors: Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-03-03 | Updated: 2023-11-03

Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights

Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi | Published: 2023-02-27 | Updated: 2023-06-15