Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters

Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23

Killing One Bird with Two Stones: Model Extraction and Attribute Inference Attacks against BERT-based APIs

Authors: Chen Chen, Xuanli He, Lingjuan Lyu, Fangzhao Wu | Published: 2021-05-23 | Updated: 2021-12-26

Privacy Amplification Via Bernoulli Sampling

Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18

Preventing Machine Learning Poisoning Attacks Using Authentication and Provenance

Authors: Jack W. Stokes, Paul England, Kevin Kane | Published: 2021-05-20

Data Curation and Quality Assurance for Machine Learning-based Cyber Intrusion Detection

Authors: Haihua Chen, Ngan Tran, Anand Sagar Thumati, Jay Bhuyan, Junhua Ding | Published: 2021-05-20

Simple Transparent Adversarial Examples

Authors: Jaydeep Borkar, Pin-Yu Chen | Published: 2021-05-20

Fed-EINI: An Efficient and Interpretable Inference Framework for Decision Tree Ensembles in Federated Learning

Authors: Xiaolin Chen, Shuai Zhou, Bei guan, Kai Yang, Hao Fan, Hu Wang, Yongji Wang | Published: 2021-05-20 | Updated: 2021-12-08

Analyzing Machine Learning Approaches for Online Malware Detection in Cloud

Authors: Jeffrey C Kimmell, Mahmoud Abdelsalam, Maanak Gupta | Published: 2021-05-19

Hunter in the Dark: Discover Anomalous Network Activity Using Deep Ensemble Network

Authors: Shiyi Yang, Hui Guo, Nour Moustafa | Published: 2021-05-19 | Updated: 2021-09-01

QUAC-TRNG: High-Throughput True Random Number Generation Using Quadruple Row Activation in Commodity DRAM Chips

Authors: Ataberk Olgun, Minesh Patel, A. Giray Yağlıkçı, Haocong Luo, Jeremie S. Kim, Nisa Bostancı, Nandita Vijaykumar, Oğuz Ergin, Onur Mutlu | Published: 2021-05-19 | Updated: 2021-05-25