Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems

Authors: Min Wang, Song Wang, Jiankun Hu | Published: 2022-03-31

Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems

Authors: Sankha Baran Dutta, Hoda Naghibijouybari, Arjun Gupta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker | Published: 2022-03-30

NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image Caption Generation Models

Authors: Simin Chen, Zihe Song, Mirazul Haque, Cong Liu, Wei Yang | Published: 2022-03-29

Attacker Attribution of Audio Deepfakes

Authors: Nicolas M. Müller, Franziska Dieckmann, Jennifer Williams | Published: 2022-03-28

Distributed data analytics

Authors: Richard Mortier, Hamed Haddadi, Sandra Servia, Liang Wang | Published: 2022-03-26

Trojan Horse Training for Breaking Defenses against Backdoor Attacks in Deep Learning

Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-03-25

Email Summarization to Assist Users in Phishing Identification

Authors: Amir Kashapov, Tingmin Wu, Alsharif Abuadbba, Carsten Rudolph | Published: 2022-03-24

MERLIN — Malware Evasion with Reinforcement LearnINg

Authors: Tony Quertier, Benjamin Marais, Stéphane Morucci, Bertrand Fournel | Published: 2022-03-24 | Updated: 2022-03-30

Powerful Physical Adversarial Examples Against Practical Face Recognition Systems

Authors: Inderjeet Singh, Toshinori Araki, Kazuya Kakizaki | Published: 2022-03-23

Ethereum Fraud Detection with Heterogeneous Graph Neural Networks

Authors: Hiroki Kanezashi, Toyotaro Suzumura, Xin Liu, Takahiro Hirofuchi | Published: 2022-03-23 | Updated: 2022-07-04