Learn to Adapt: Robust Drift Detection in Security Domain

Authors: Aditya Kuppa, Nhien-An Le-Khac | Published: 2022-06-15

YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

Authors: Stefan More, Lukas Alber | Published: 2022-06-15

Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection

Authors: Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete | Published: 2022-06-15

On the explainable properties of 1-Lipschitz Neural Networks: An Optimal Transport Perspective

Authors: Mathieu Serrurier, Franck Mamalet, Thomas Fel, Louis Béthune, Thibaut Boissin | Published: 2022-06-14 | Updated: 2024-02-02

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt | Published: 2022-06-13

Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification

Authors: Daniel Gibert, Carles Mateu, Jordi Planes, Quan Le | Published: 2022-06-12

Darknet Traffic Classification and Adversarial Attacks

Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12

Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency

Authors: Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Yao Cheng, Changting Lin | Published: 2022-06-11

Bayesian Estimation of Differential Privacy

Authors: Santiago Zanella-Béguelin, Lukas Wutschitz, Shruti Tople, Ahmed Salem, Victor Rühle, Andrew Paverd, Mohammad Naseri, Boris Köpf, Daniel Jones | Published: 2022-06-10 | Updated: 2022-06-15

Muffliato: Peer-to-Peer Privacy Amplification for Decentralized Optimization and Averaging

Authors: Edwige Cyffers, Mathieu Even, Aurélien Bellet, Laurent Massoulié | Published: 2022-06-10 | Updated: 2024-06-11