SCAR: Power Side-Channel Analysis at RTL-Level

Authors: Amisha Srivastava, Sanjay Das, Navnil Choudhury, Rafail Psiakis, Pedro Henrique Silva, Debjit Pal, Kanad Basu | Published: 2023-10-10

Differentially Private Multi-Site Treatment Effect Estimation

Authors: Tatsuki Koga, Kamalika Chaudhuri, David Page | Published: 2023-10-10

LLM for SoC Security: A Paradigm Shift

Authors: Dipayan Saha, Shams Tarek, Katayoon Yahyaei, Sujan Kumar Saha, Jingbo Zhou, Mark Tehranipoor, Farimah Farahmandi | Published: 2023-10-09

Adversarial Attacks on Combinatorial Multi-Armed Bandits

Authors: Rishab Balasubramanian, Jiawei Li, Prasad Tadepalli, Huazheng Wang, Qingyun Wu, Haoyu Zhao | Published: 2023-10-08 | Updated: 2024-06-04

Transferable Availability Poisoning Attacks

Authors: Yiyong Liu, Michael Backes, Xiao Zhang | Published: 2023-10-08 | Updated: 2024-06-06

Privacy-Preserving Financial Anomaly Detection via Federated Learning & Multi-Party Computation

Authors: Sunpreet Arora, Andrew Beams, Panagiotis Chatzigiannis, Sebastian Meiser, Karan Patel, Srinivasan Raghuraman, Peter Rindal, Harshal Shah, Yizhen Wang, Yuhang Wu, Hao Yang, Mahdi Zamani | Published: 2023-10-06

A Survey of Data Security: Practices from Cybersecurity and Challenges of Machine Learning

Authors: Padmaksha Roy, Jaganmohan Chandrasekaran, Erin Lanus, Laura Freeman, Jeremy Werner | Published: 2023-10-06 | Updated: 2023-12-04

Risk factor aggregation and stress testing

Authors: Natalie Packham | Published: 2023-10-06

Assessing Robustness via Score-Based Adversarial Image Generation

Authors: Marcel Kollovieh, Lukas Gosch, Yan Scholten, Marten Lienen, Stephan Günnemann | Published: 2023-10-06

Threat Trekker: An Approach to Cyber Threat Hunting

Authors: Ángel Casanova Bienzobas, Alfonso Sánchez-Macián | Published: 2023-10-06