Decentralized Federated Learning: A Survey on Security and Privacy

Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif, Boyu Wang, Qiang Yang | Published: 2024-01-25

SunBlock: Cloudless Protection for IoT Systems

Authors: Vadim Safronov, Anna Maria Mandalari, Daniel J. Dubois, David Choffnes, Hamed Haddadi | Published: 2024-01-25

Sparse and Transferable Universal Singular Vectors Attack

Authors: Kseniia Kuvshinova, Olga Tsymboi, Ivan Oseledets | Published: 2024-01-25

A Training Rate and Survival Heuristic for Inference and Robustness Evaluation (TRASHFIRE)

Authors: Charles Meyers, Mohammad Reza Saleh Sedghpour, Tommy Löfstedt, Erik Elmroth | Published: 2024-01-24 | Updated: 2024-09-11

Predicting SSH keys in Open SSH Memory dumps

Authors: Florian Rascoussier | Published: 2024-01-24

Beimingwu: A Learnware Dock System

Authors: Zhi-Hao Tan, Jian-Dong Liu, Xiao-Dong Bi, Peng Tan, Qin-Cheng Zheng, Hai-Tian Liu, Yi Xie, Xiao-Chuan Zou, Yang Yu, Zhi-Hua Zhou | Published: 2024-01-24

ReposVul: A Repository-Level High-Quality Vulnerability Dataset

Authors: Xinchen Wang, Ruida Hu, Cuiyun Gao, Xin-Cheng Wen, Yujia Chen, Qing Liao | Published: 2024-01-24 | Updated: 2024-02-08

MAPPING: Debiasing Graph Neural Networks for Fair Node Classification with Limited Sensitive Information Leakage

Authors: Ying Song, Balaji Palanisamy | Published: 2024-01-23 | Updated: 2025-01-26

Wasserstein Differential Privacy

Authors: Chengyi Yang, Jiayin Qi, Aimin Zhou | Published: 2024-01-23

Text Embedding Inversion Security for Multilingual Language Models

Authors: Yiyi Chen, Heather Lent, Johannes Bjerva | Published: 2024-01-22 | Updated: 2024-06-05