Federated and Privacy-Preserving Learning of Accounting Data in Financial Statement Audits

Authors: Marco Schreyer, Timur Sattarov, Damian Borth | Published: 2022-08-26

I still know it’s you! On Challenges in Anonymizing Source Code

Authors: Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck | Published: 2022-08-26 | Updated: 2024-04-10

Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns

Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal | Published: 2022-08-26

DiVa: An Accelerator for Differentially Private Machine Learning

Authors: Beomsik Park, Ranggi Hwang, Dongho Yoon, Yoonhyuk Choi, Minsoo Rhu | Published: 2022-08-26

COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies

Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27

SNAP: Efficient Extraction of Private Properties with Poisoning

Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman | Published: 2022-08-25 | Updated: 2023-06-21

Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study

Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo | Published: 2022-08-25

Empirical study of Machine Learning Classifier Evaluation Metrics behavior in Massively Imbalanced and Noisy data

Authors: Gayan K. Kulatilleke, Sugandika Samarakoon | Published: 2022-08-25

Credit card fraud detection – Classifier selection strategy

Authors: Gayan K. Kulatilleke | Published: 2022-08-25

Joint Privacy Enhancement and Quantization in Federated Learning

Authors: Natalie Lang, Elad Sofer, Tomer Shaked, Nir Shlezinger | Published: 2022-08-23