Machine Learning

Securing Manufacturing Using Blockchain

Authors: Zahra Jadidi, Ali Dorri, Raja Jurdak, Colin Fidge | Published: 2020-10-15
Network Threat Detection
Blockchain Technology
Machine Learning

Privacy-Preserving Object Detection & Localization Using Distributed Machine Learning: A Case Study of Infant Eyeblink Conditioning

Authors: Stefan Zwaard, Henk-Jan Boele, Hani Alers, Christos Strydis, Casey Lew-Williams, Zaid Al-Ars | Published: 2020-10-14
Machine Learning
Federated Learning
Face Recognition

Chasing Your Long Tails: Differentially Private Prediction in Health Care Settings

Authors: Vinith M. Suriyakumar, Nicolas Papernot, Anna Goldenberg, Marzyeh Ghassemi | Published: 2020-10-13
DP-SGD
Data Privacy Assessment
Machine Learning

Toward Few-step Adversarial Training from a Frequency Perspective

Authors: Hans Shih-Han Wang, Cory Cornelius, Brandon Edwards, Jason Martin | Published: 2020-10-13
Generalization Performance
Optimization Problem
Machine Learning

S3ML: A Secure Serving System for Machine Learning Inference

Authors: Junming Ma, Chaofan Yu, Aihui Zhou, Bingzhe Wu, Xibin Wu, Xingyu Chen, Xiangqun Chen, Lei Wang, Donggang Cao | Published: 2020-10-13
SGX Application Development
Information Security
Machine Learning

CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails

Authors: Younghoo Lee, Joshua Saxe, Richard Harang | Published: 2020-10-07
Model Architecture
Improvement of Learning
Machine Learning

Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples

Authors: Yael Mathov, Eden Levy, Ziv Katzir, Asaf Shabtai, Yuval Elovici | Published: 2020-10-07 | Updated: 2021-09-02
Membership Inference
Adversarial attack
Machine Learning

BAAAN: Backdoor Attacks Against Autoencoder and GAN-Based Machine Learning Models

Authors: Ahmed Salem, Yannick Sautter, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-10-06 | Updated: 2020-10-08
Dataset evaluation
Backdoor Attack
Machine Learning

PCAL: A Privacy-preserving Intelligent Credit Risk Modeling Framework Based on Adversarial Learning

Authors: Yuli Zheng, Zhenyu Wu, Ye Yuan, Tianlong Chen, Zhangyang Wang | Published: 2020-10-06
Data Protection Method
Machine Learning
Financial Intelligence

Metadata-Based Detection of Child Sexual Abuse Material

Authors: Mayana Pereira, Rahul Dodhia, Hyrum Anderson, Richard Brown | Published: 2020-10-05 | Updated: 2021-10-27
Dataset evaluation
Model Evaluation
Machine Learning