SoK: A Study of the Security on Voice Processing Systems

Authors: Robert Chang, Logan Kuo, Arthur Liu, Nader Sehatbakhsh | Published: 2021-12-24

DP-UTIL: Comprehensive Utility Analysis of Differential Privacy in Machine Learning

Authors: Ismat Jarin, Birhanu Eshete | Published: 2021-12-24

Parameter identifiability of a deep feedforward ReLU neural network

Authors: Joachim Bona-Pellissier, François Bachoc, François Malgouyres | Published: 2021-12-24 | Updated: 2023-05-12

EIFFeL: Ensuring Integrity for Federated Learning

Authors: Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten | Published: 2021-12-23 | Updated: 2022-09-12

Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy

Authors: Riad Ladjel, Nicolas Anciaux, Aurélien Bellet, Guillaume Scerri | Published: 2021-12-23

Statistical Feature-based Personal Information Detection in Mobile Network Traffic

Authors: Shuang Zhao, Shuhui Chen, Ziling Wei | Published: 2021-12-23

Detect & Reject for Transferability of Black-box Adversarial Attacks Against Network Intrusion Detection Systems

Authors: Islam Debicha, Thibault Debatty, Jean-Michel Dricot, Wim Mees, Tayeb Kenaza | Published: 2021-12-22

Towards Malicious address identification in Bitcoin

Authors: Deepesh Chaudhari, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2021-12-22

Distributed Machine Learning and the Semblance of Trust

Authors: Dmitrii Usynin, Alexander Ziller, Daniel Rueckert, Jonathan Passerat-Palmbach, Georgios Kaissis | Published: 2021-12-21

ANUBIS: A Provenance Graph-Based Framework for Advanced Persistent Threat Detection

Authors: Md. Monowar Anjum, Shahrear Iqbal, Benoit Hamelin | Published: 2021-12-21