A Unified Hardware-based Threat Detector for AI Accelerators

Authors: Xiaobei Yan, Han Qiu, Tianwei Zhang | Published: 2023-11-28

MIA-BAD: An Approach for Enhancing Membership Inference Attack and its Mitigation with Federated Learning

Authors: Soumya Banerjee, Sandip Roy, Sayyed Farid Ahamed, Devin Quinn, Marc Vucovich, Dhruv Nandakumar, Kevin Choi, Abdul Rahman, Edward Bowen, Sachin Shetty | Published: 2023-11-28

Understanding the Process of Data Labeling in Cybersecurity

Authors: Tobias Braun, Irdin Pekaric, Giovanni Apruzzese | Published: 2023-11-28

“Do Users fall for Real Adversarial Phishing?” Investigating the Human response to Evasive Webpages

Authors: Ajka Draganovic, Savino Dambra, Javier Aldana Iuit, Kevin Roundy, Giovanni Apruzzese | Published: 2023-11-28

Darknet Traffic Analysis A Systematic Literature Review

Authors: Javeriah Saleem, Rafiqul Islam, Zahidul Islam | Published: 2023-11-27

Using Decentralized Aggregation for Federated Learning with Differential Privacy

Authors: Hadeel Abd El-Kareem, Abd El-Moaty Saleh, Ana Fernández-Vilas, Manuel Fernández-Veiga, asser El-Sonbaty | Published: 2023-11-27

Rethinking Privacy in Machine Learning Pipelines from an Information Flow Control Perspective

Authors: Lukas Wutschitz, Boris Köpf, Andrew Paverd, Saravan Rajmohan, Ahmed Salem, Shruti Tople, Santiago Zanella-Béguelin, Menglin Xia, Victor Rühle | Published: 2023-11-27

Automated discovery of trade-off between utility, privacy and fairness in machine learning models

Authors: Bogdan Ficiu, Neil D. Lawrence, Andrei Paleyes | Published: 2023-11-27

Secure and Verifiable Data Collaboration with Low-Cost Zero-Knowledge Proofs

Authors: Yizheng Zhu, Yuncheng Wu, Zhaojing Luo, Beng Chin Ooi, Xiaokui Xiao | Published: 2023-11-26

Exploiting Large Language Models (LLMs) through Deception Techniques and Persuasion Principles

Authors: Sonali Singh, Faranak Abri, Akbar Siami Namin | Published: 2023-11-24