Machine Learning

A Framework of Randomized Selection Based Certified Defenses Against Data Poisoning Attacks

Authors: Ruoxin Chen, Jie Li, Chentao Wu, Bin Sheng, Ping Li | Published: 2020-09-18 | Updated: 2020-10-13
Robust Regression
Adversarial Training
Machine Learning

On Primes, Log-Loss Scores and (No) Privacy

Authors: Abhinav Aggarwal, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-09-17
Membership Inference
Machine Learning
evaluation metrics

An Extension of Fano’s Inequality for Characterizing Model Susceptibility to Membership Inference Attacks

Authors: Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Sunny Raj, Alvaro Velasquez, Laura L. Pullum, Ananthram Swami | Published: 2020-09-17
Membership Inference
Machine Learning

The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services

Authors: Ahmed Mohamed Hussain, Gabriele Oligeri, Thiemo Voigt | Published: 2020-09-16 | Updated: 2021-07-25
Device Identification Method
Machine Learning
Communication Efficiency

Puzzle Mix: Exploiting Saliency and Local Statistics for Optimal Mixup

Authors: Jang-Hyun Kim, Wonho Choo, Hyun Oh Song | Published: 2020-09-15 | Updated: 2020-12-30
Data Generation
Selection and Evaluation of Optimization Algorithms
Machine Learning

Efficient Private Machine Learning by Differentiable Random Transformations

Authors: Fei Zheng | Published: 2020-08-18
Membership Inference
Encryption Method
Machine Learning

New Directions in Automated Traffic Analysis

Authors: Jordan Holland, Paul Schmitt, Nick Feamster, Prateek Mittal | Published: 2020-08-06 | Updated: 2021-10-19
Watermarking
Data Extraction and Analysis
Machine Learning

Training DNN Model with Secret Key for Model Protection

Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-08-06
Watermarking
Adversarial Learning
Machine Learning

Bayesian Optimization with Machine Learning Algorithms Towards Anomaly Detection

Authors: MohammadNoor Injadat, Fadi Salo, Ali Bou Nassif, Aleksander Essex, Abdallah Shami | Published: 2020-08-05
Attack Detection
Machine Learning
Anomaly Detection Method

More Than Privacy: Applying Differential Privacy in Key Areas of Artificial Intelligence

Authors: Tianqing Zhu, Dayong Ye, Wei Wang, Wanlei Zhou, Philip S. Yu | Published: 2020-08-05
Game Theory
Privacy Assessment
Machine Learning