Deep Leakage from Model in Federated Learning

Authors: Zihao Zhao, Mengen Luo, Wenbo Ding | Published: 2022-06-10

Membership Inference via Backdooring

Authors: Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang | Published: 2022-06-10

Leveraging Centric Data Federated Learning Using Blockchain For Integrity Assurance

Authors: Riadh Ben Chaabene, Darine Amayed, Mohamed Cheriet | Published: 2022-06-09

A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning

Authors: Alberto Blanco-Justicia, David Sanchez, Josep Domingo-Ferrer, Krishnamurty Muralidhar | Published: 2022-06-09 | Updated: 2022-07-05

GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing

Authors: Zhongkai Hao, Chengyang Ying, Yinpeng Dong, Hang Su, Jun Zhu, Jian Song | Published: 2022-06-09 | Updated: 2022-06-29

Analytical Composition of Differential Privacy via the Edgeworth Accountant

Authors: Hua Wang, Sheng Gao, Huanyu Zhang, Milan Shen, Weijie J. Su | Published: 2022-06-09

Generative Adversarial Networks and Image-Based Malware Classification

Authors: Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp | Published: 2022-06-08

To remove or not remove Mobile Apps? A data-driven predictive model approach

Authors: Fadi Mohsen, Dimka Karastoyanova, George Azzopardi | Published: 2022-06-08

Gradient Obfuscation Gives a False Sense of Security in Federated Learning

Authors: Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai | Published: 2022-06-08 | Updated: 2022-10-14

Dap-FL: Federated Learning flourishes by adaptive tuning and secure aggregation

Authors: Qian Chen, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin | Published: 2022-06-08