Data Generation

Secure Machine Learning in the Cloud Using One Way Scrambling by Deconvolution

Authors: Yiftach Savransky, Roni Mateless, Gilad Katz | Published: 2021-11-04
Data Generation
Privacy Protection
Reconstruction Durability

Don’t Generate Me: Training Differentially Private Generative Models with Sinkhorn Divergence

Authors: Tianshi Cao, Alex Bie, Arash Vahdat, Sanja Fidler, Karsten Kreis | Published: 2021-11-01 | Updated: 2021-11-29
Data Generation
Trade-off Analysis
Privacy Risk Management

Availability Attacks Create Shortcuts

Authors: Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, Tie-Yan Liu | Published: 2021-11-01 | Updated: 2022-06-02
DDoS Attack
Data Generation
Adversarial Attack Detection

A ground-truth dataset of real security patches

Authors: Sofia Reis, Rui Abreu | Published: 2021-10-18
Data Generation
Data Management System
Automated Vulnerability Remediation

Infinitely Divisible Noise in the Low Privacy Regime

Authors: Rasmus Pagh, Nina Mesing Stausholm | Published: 2021-10-13 | Updated: 2022-03-07
Data Generation
Privacy Violation
Federated Learning

Datasets are not Enough: Challenges in Labeling Network Traffic

Authors: Jorge Guerra, Carlos Catania, Eduardo Veas | Published: 2021-10-12 | Updated: 2021-12-30
Challenges of Data Labeling
Data Generation
Role of Machine Learning

Sharing FANCI Features: A Privacy Analysis of Feature Extraction for DGA Detection

Authors: Benedikt Holmes, Arthur Drichel, Ulrike Meyer | Published: 2021-10-12
Data Generation
Privacy Violation
Machine Learning Algorithm

Adversarial Attacks in a Multi-view Setting: An Empirical Study of the Adversarial Patches Inter-view Transferability

Authors: Bilel Tarchoun, Ihsen Alouani, Anouar Ben Khalifa, Mohamed Ali Mahjoub | Published: 2021-10-10
Data Generation
Adversarial Attack Methods
Physical attack

Machine learning attack on copy detection patterns: are 1×1 patterns cloneable?

Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 | Updated: 2021-10-06
Algorithm
Data Generation
Performance Evaluation

Mobile authentication of copy detection patterns: how critical is to know fakes?

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05
Data Generation
Performance Evaluation
Intellectual Property Protection