Machine Learning Method

A Blockchain Solution for Collaborative Machine Learning over IoT

Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23
Security Analysis
Privacy Protection
Machine Learning Method

DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction

Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique | Published: 2023-11-20
Adversarial attack
Machine Learning Method
Dimensionality Reduction Method

HAL 9000: Skynet’s Risk Manager

Authors: Tadeu Freitas, Mário Neto, Inês Dutra, João Soares, Manuel Correia, Rolando Martins | Published: 2023-11-15
Software Security
Machine Learning Method
Vulnerability Management

Are Normalizing Flows the Key to Unlocking the Exponential Mechanism?

Authors: Robert A. Bridges, Vandy J. Tombs, Christopher B. Stanley | Published: 2023-11-15 | Updated: 2024-06-11
Privacy Protection
Convergence Property
Machine Learning Method

B^2SFL: A Bi-level Blockchained Architecture for Secure Federated Learning-based Traffic Prediction

Authors: Hao Guo, Collin Meese, Wanxin Li, Chien-Chung Shen, Mark Nejad | Published: 2023-10-23
Privacy Technique
Model Design
Machine Learning Method

Fundamental Limits of Membership Inference Attacks on Machine Learning Models

Authors: Eric Aubinais, Elisabeth Gassiat, Pablo Piantanida | Published: 2023-10-20 | Updated: 2025-05-12
Membership Inference
Adversarial attack
Machine Learning Method

On existence, uniqueness and scalability of adversarial robustness measures for AI classifiers

Authors: Illia Horenko | Published: 2023-10-19 | Updated: 2023-11-15
Adversarial attack
Optimization Methods
Machine Learning Method

Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection

Authors: Marc Schmitt | Published: 2023-10-15
Cybersecurity
Network Threat Detection
Machine Learning Method

Adversarial Attacks on Combinatorial Multi-Armed Bandits

Authors: Rishab Balasubramanian, Jiawei Li, Prasad Tadepalli, Huazheng Wang, Qingyun Wu, Haoyu Zhao | Published: 2023-10-08 | Updated: 2024-06-04
Algorithm
Watermarking
Machine Learning Method

Transferable Availability Poisoning Attacks

Authors: Yiyong Liu, Michael Backes, Xiao Zhang | Published: 2023-10-08 | Updated: 2024-06-06
Poisoning
Selection and Evaluation of Optimization Algorithms
Machine Learning Method