Breaking the De-Pois Poisoning Defense

Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03

Towards Web Phishing Detection Limitations and Mitigation

Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal | Published: 2022-04-03

Convolutional Neural Networks for Image Spam Detection

Authors: Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp | Published: 2022-04-02

Production of Categorical Data Verifying Differential Privacy: Conception and Applications to Machine Learning

Authors: Héber H. Arcolezi | Published: 2022-04-02

Scalable Whitebox Attacks on Tree-based Models

Authors: Giuseppe Castiglione, Gavin Ding, Masoud Hashemi, Christopher Srinivasa, Ga Wu | Published: 2022-03-31

Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets

Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini | Published: 2022-03-31 | Updated: 2022-10-06

Efficient Dropout-resilient Aggregation for Privacy-preserving Machine Learning

Authors: Ziyao Liu, Jiale Guo, Kwok-Yan Lam, Jun Zhao | Published: 2022-03-31

Differentially Private Federated Learning via Reconfigurable Intelligent Surface

Authors: Yuhan Yang, Yong Zhou, Youlong Wu, Yuanming Shi | Published: 2022-03-31

Privacy-Preserving Aggregation in Federated Learning: A Survey

Authors: Ziyao Liu, Jiale Guo, Wenzhuo Yang, Jiani Fan, Kwok-Yan Lam, Jun Zhao | Published: 2022-03-31 | Updated: 2022-07-13

Ransomware Detection using Process Memory

Authors: Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter | Published: 2022-03-31