A Robust Phased Elimination Algorithm for Corruption-Tolerant Gaussian Process Bandits

Authors: Ilija Bogunovic, Zihan Li, Andreas Krause, Jonathan Scarlett | Published: 2022-02-03 | Updated: 2022-03-28

Byzantine-Robust Decentralized Learning via ClippedGossip

Authors: Lie He, Sai Praneeth Karimireddy, Martin Jaggi | Published: 2022-02-03 | Updated: 2023-04-20

Parameters or Privacy: A Provable Tradeoff Between Overparameterization and Membership Inference

Authors: Jasper Tan, Blake Mason, Hamid Javadi, Richard G. Baraniuk | Published: 2022-02-02 | Updated: 2022-11-30

Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks

Authors: Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger | Published: 2022-01-31 | Updated: 2022-04-25

Cryptocurrency Valuation: An Explainable AI Approach

Authors: Yulin Liu, Luyao Zhang | Published: 2022-01-30 | Updated: 2023-07-08

Transfer Learning In Differential Privacy’s Hybrid-Model

Authors: Refael Kohen, Or Sheffet | Published: 2022-01-28 | Updated: 2022-06-16

SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders

Authors: Tianshuo Cong, Xinlei He, Yang Zhang | Published: 2022-01-27 | Updated: 2022-08-31

An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

Authors: Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota | Published: 2022-01-26 | Updated: 2022-04-16

Reconstructing Training Data with Informed Adversaries

Authors: Borja Balle, Giovanni Cherubin, Jamie Hayes | Published: 2022-01-13 | Updated: 2022-04-25

Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges

Authors: Huaming Chen, M. Ali Babar | Published: 2022-01-12 | Updated: 2023-12-17