Differentially Private Label Protection in Split Learning

Authors: Xin Yang, Jiankai Sun, Yuanshun Yao, Junyuan Xie, Chong Wang | Published: 2022-03-04

Why adversarial training can hurt robust accuracy

Authors: Jacob Clarysse, Julia Hörrmann, Fanny Yang | Published: 2022-03-03

Label Leakage and Protection from Forward Embedding in Vertical Federated Learning

Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang | Published: 2022-03-02 | Updated: 2022-05-25

Adversarial attacks on neural networks through canonical Riemannian foliations

Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18

PUMA: Performance Unchanged Model Augmentation for Training Data Removal

Authors: Ga Wu, Masoud Hashemi, Christopher Srinivasa | Published: 2022-03-02

A Method Based on Deep Learning for the Detection and Characterization of Cybersecurity Incidents in Internet of Things Devices

Authors: Jhon Alexánder Parra, Sergio Armando Gutiérrez, John Willian Branch | Published: 2022-03-01

Beyond Gradients: Exploiting Adversarial Priors in Model Inversion Attacks

Authors: Dmitrii Usynin, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-01

Explaining RADAR features for detecting spoofing attacks in Connected Autonomous Vehicles

Authors: Nidhi Rastogi, Sara Rampazzi, Michael Clifford, Miriam Heller, Matthew Bishop, Karl Levitt | Published: 2022-03-01

Quantum Differential Privacy: An Information Theory Perspective

Authors: Christoph Hirche, Cambyse Rouzé, Daniel Stilck França | Published: 2022-02-22 | Updated: 2023-04-06

ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code

Authors: Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos | Published: 2022-02-21 | Updated: 2023-04-21