Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis

Authors: Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee | Published: 2022-09-12

SmartKex: Machine Learning Assisted SSH Keys Extraction From The Heap Dump

Authors: Christofer Fellicious, Stewart Sentanoe, Michael Granitzer, Hans P. Reiser | Published: 2022-09-12 | Updated: 2022-09-13

Preserving Privacy in Federated Learning with Ensemble Cross-Domain Knowledge Distillation

Authors: Xuan Gong, Abhishek Sharma, Srikrishna Karanam, Ziyan Wu, Terrence Chen, David Doermann, Arun Innanje | Published: 2022-09-10

Defend Data Poisoning Attacks on Voice Authentication

Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07

Private Read Update Write (PRUW) in Federated Submodel Learning (FSL): Communication Efficient Schemes With and Without Sparsification

Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-09-09

On Specification-based Cyber-Attack Detection in Smart Grids

Authors: Ömer Sen Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze | Published: 2022-09-09

Bridging the Gap: Differentially Private Equivariant Deep Learning for Medical Image Analysis

Authors: Florian A. Hölzl, Daniel Rueckert, Georgios Kaissis | Published: 2022-09-09 | Updated: 2023-06-20

Differentially Private Stochastic Gradient Descent with Low-Noise

Authors: Puyu Wang, Yunwen Lei, Yiming Ying, Ding-Xuan Zhou | Published: 2022-09-09 | Updated: 2023-07-14

Exploiting Nanoelectronic Properties of Memory Chips for Prevention of IC Counterfeiting

Authors: Supriya Chakraborty, Tamoghno Das, Manan Suri | Published: 2022-09-09

A Framework for Evaluating Privacy-Utility Trade-off in Vertical Federated Learning

Authors: Yan Kang, Jiahuan Luo, Yuanqin He, Xiaojin Zhang, Lixin Fan, Qiang Yang | Published: 2022-09-08 | Updated: 2024-08-04