Embedding Java Classes with code2vec: Improvements from Variable Obfuscation

Authors: Rhys Compton, Eibe Frank, Panos Patros, Abigail Koay | Published: 2020-04-06

PrivFL: Practical Privacy-preserving Federated Regressions on High-dimensional Data over Mobile Networks

Authors: Kalikinkar Mandal, Guang Gong | Published: 2020-04-05

Private Knowledge Transfer via Model Distillation with Generative Adversarial Networks

Authors: Di Gao, Cheng Zhuo | Published: 2020-04-05

Differential 3D Facial Recognition: Adding 3D to Your State-of-the-Art 2D Method

Authors: J. Matias Di Martino, Fernando Suzacq, Mauricio Delbracio, Qiang Qiu, Guillermo Sapiro | Published: 2020-04-03

An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies

Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01

Botnet Detection Using Recurrent Variational Autoencoder

Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu | Published: 2020-04-01

MetaPoison: Practical General-purpose Clean-label Data Poisoning

Authors: W. Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, Tom Goldstein | Published: 2020-04-01 | Updated: 2021-02-21

Information Leakage in Embedding Models

Authors: Congzheng Song, Ananth Raghunathan | Published: 2020-03-31 | Updated: 2020-08-19

Differentially Private Naive Bayes Classifier using Smooth Sensitivity

Authors: Farzad Zafarani, Chris Clifton | Published: 2020-03-31 | Updated: 2021-07-19

Policy Teaching via Environment Poisoning: Training-time Adversarial Attacks against Reinforcement Learning

Authors: Amin Rakhsha, Goran Radanovic, Rati Devidze, Xiaojin Zhu, Adish Singla | Published: 2020-03-28 | Updated: 2020-08-19