SoK: Unintended Interactions among Machine Learning Defenses and Risks

Authors: Vasisht Duddu, Sebastian Szyller, N. Asokan | Published: 2023-12-07 | Updated: 2024-04-04

Privacy-preserving quantum federated learning via gradient hiding

Authors: Changhao Li, Niraj Kumar, Zhixin Song, Shouvanik Chakrabarti, Marco Pistoia | Published: 2023-12-07

MediHunt: A Network Forensics Framework for Medical IoT Devices

Authors: Ayushi Mishra, Tej Kiran Boppana, Priyanka Bagade | Published: 2023-12-07

Defense against ML-based Power Side-channel Attacks on DNN Accelerators with Adversarial Attacks

Authors: Xiaobei Yan, Chip Hong Chang, Tianwei Zhang | Published: 2023-12-07

Understanding (Un)Intended Memorization in Text-to-Image Generative Models

Authors: Ali Naseh, Jaechul Roh, Amir Houmansadr | Published: 2023-12-06

Dr. Jekyll and Mr. Hyde: Two Faces of LLMs

Authors: Matteo Gioele Collu, Tom Janssen-Groesbeek, Stefanos Koffas, Mauro Conti, Stjepan Picek | Published: 2023-12-06 | Updated: 2024-10-07

Feature Analysis of Encrypted Malicious Traffic

Authors: Anish Singh Shekhawat, Fabio Di Troia, Mark Stamp | Published: 2023-12-06

Low-Cost High-Power Membership Inference Attacks

Authors: Sajjad Zarifzadeh, Philippe Liu, Reza Shokri | Published: 2023-12-06 | Updated: 2024-06-12

A Simple Framework to Enhance the Adversarial Robustness of Deep Learning-based Intrusion Detection System

Authors: Xinwei Yuan, Shu Han, Wei Huang, Hongliang Ye, Xianglong Kong, Fan Zhang | Published: 2023-12-06

Provable Adversarial Robustness for Group Equivariant Tasks: Graphs, Point Clouds, Molecules, and More

Authors: Jan Schuchardt, Yan Scholten, Stephan Günnemann | Published: 2023-12-05 | Updated: 2024-01-15