Ensemble Classifier Design Tuned to Dataset Characteristics for Network Intrusion Detection

Authors: Zeinab Zoghi, Gursel Serpen | Published: 2022-05-08

Evaluation of a User Authentication Schema Using Behavioral Biometrics and Machine Learning

Authors: Laura Pryor, Jacob Mallet, Rushit Dave, Naeem Seliya, Mounika Vanamala, Evelyn Sowells Boone | Published: 2022-05-07

Privacy accounting $\varepsilon$conomics: Improving differential privacy composition via a posteriori bounds

Authors: Valentin Hartmann, Vincent Bindschaedler, Alexander Bentkamp, Robert West | Published: 2022-05-06 | Updated: 2023-06-19

Fusion: Efficient and Secure Inference Resilient to Malicious Servers

Authors: Caiqin Dong, Jian Weng, Jia-Nan Liu, Yue Zhang, Yao Tong, Anjia Yang, Yudan Cheng, Shun Hu | Published: 2022-05-06 | Updated: 2023-06-10

Large Scale Transfer Learning for Differentially Private Image Classification

Authors: Harsh Mehta, Abhradeep Thakurta, Alexey Kurakin, Ashok Cutkosky | Published: 2022-05-06 | Updated: 2022-05-20

Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems

Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05

Provably Confidential Language Modelling

Authors: Xuandong Zhao, Lei Li, Yu-Xiang Wang | Published: 2022-05-04 | Updated: 2022-06-23

Universal Optimality and Robust Utility Bounds for Metric Differential Privacy

Authors: Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding | Published: 2022-05-03

Performance Weighting for Robust Federated Learning Against Corrupted Sources

Authors: Dimitris Stripelis, Marcin Abram, Jose Luis Ambite | Published: 2022-05-02

Reducing the Cost of Training Security Classifier (via Optimized Semi-Supervised Learning)

Authors: Rui Shu, Tianpei Xia, Huy Tu, Laurie Williams, Tim Menzies | Published: 2022-05-02