Algorithm Design

PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning

Authors: Owen Millwood, Jack Miskelly, Bohao Yang, Prosanta Gope, Elif Kavun, Chenghua Lin | Published: 2022-07-11
Algorithm Design
Model Design and Accuracy
Defense Method

Best Subset Selection with Efficient Primal-Dual Algorithm

Authors: Shaogang Ren, Guanhua Fang, Ping Li | Published: 2022-07-05
Algorithm Design
Optimization Problem
Feature Selection Method

Defending against the Label-flipping Attack in Federated Learning

Authors: Najeeb Moharram Jebreel, Josep Domingo-Ferrer, David Sánchez, Alberto Blanco-Justicia | Published: 2022-07-05
Algorithm Design
Poisoning
Defense Method

High-Dimensional Private Empirical Risk Minimization by Greedy Coordinate Descent

Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2022-07-04 | Updated: 2023-04-09
Algorithm Design
Convergence Guarantee
Selection and Evaluation of Optimization Algorithms

FL-Defender: Combating Targeted Attacks in Federated Learning

Authors: Najeeb Jebreel, Josep Domingo-Ferrer | Published: 2022-07-02
Attack Methods against DFL
Algorithm Design
Poisoning

When Does Differentially Private Learning Not Suffer in High Dimensions?

Authors: Xuechen Li, Daogao Liu, Tatsunori Hashimoto, Huseyin A. Inan, Janardhan Kulkarni, Yin Tat Lee, Abhradeep Guha Thakurta | Published: 2022-07-01 | Updated: 2022-10-26
Algorithm Design
Sample Complexity
Privacy Risk Management

IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound

Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31
Algorithm Design
Efficient Proof System
Adversarial Learning

Approximate Data Deletion in Generative Models

Authors: Zhifeng Kong, Scott Alfeld | Published: 2022-06-29
Algorithm Design
Data Leakage
Hypothesis Testing

Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model

Authors: Xudong Pan, Yifan Yan, Shengyao Zhang, Mi Zhang, Min Yang | Published: 2022-06-29
DNN IP Protection Method
Algorithm Design
Membership Inference

A Deep Learning Approach to Create DNS Amplification Attacks

Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29
Algorithm Design
Backdoor Attack
Adversarial Attack Detection