Robust Upper Bounds for Adversarial Training

Authors: Dimitris Bertsimas, Xavier Boix, Kimberly Villalobos Carballo, Dick den Hertog | Published: 2021-12-17 | Updated: 2023-04-06

Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives

Authors: Arawinkumaar Selvakkumar, Shantanu Pal, Zahra Jadidi | Published: 2021-12-16

Model Stealing Attacks Against Inductive Graph Neural Networks

Authors: Yun Shen, Xinlei He, Yufei Han, Yang Zhang | Published: 2021-12-15

Few-shot Instruction Prompts for Pretrained Language Models to Detect Social Biases

Authors: Shrimai Prabhumoye, Rafal Kocielnik, Mohammad Shoeybi, Anima Anandkumar, Bryan Catanzaro | Published: 2021-12-15 | Updated: 2022-04-15

HyObscure: Hybrid Obscuring for Privacy-Preserving Data Publishing

Authors: Xiao Han, Yuncong Yang, Junjie Wu | Published: 2021-12-15

Robustifying automatic speech recognition by extracting slowly varying features

Authors: Matías Pizarro, Dorothea Kolossa, Asja Fischer | Published: 2021-12-14 | Updated: 2024-11-06

Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP)

Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2021-12-14

MuxLink: Circumventing Learning-Resilient MUX-Locking Using Graph Neural Network-based Link Prediction

Authors: Lilas Alrahis, Satwik Patnaik, Muhammad Shafique, Ozgur Sinanoglu | Published: 2021-12-14

Efficient Differentially Private Secure Aggregation for Federated Learning via Hardness of Learning with Errors

Authors: Timothy Stevens, Christian Skalka, Christelle Vincent, John Ring, Samuel Clark, Joseph Near | Published: 2021-12-13

Does Fully Homomorphic Encryption Need Compute Acceleration?

Authors: Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi | Published: 2021-12-13 | Updated: 2021-12-14