Regularization properties of adversarially-trained linear regression

Authors: Antônio H. Ribeiro, Dave Zachariah, Francis Bach, Thomas B. Schön | Published: 2023-10-16

Demystifying Poisoning Backdoor Attacks from a Statistical Perspective

Authors: Ganghua Wang, Xun Xian, Jayanth Srinivasa, Ashish Kundu, Xuan Bi, Mingyi Hong, Jie Ding | Published: 2023-10-16 | Updated: 2023-10-18

A Comprehensive Study of Privacy Risks in Curriculum Learning

Authors: Joann Qiongna Chen, Xinlei He, Zheng Li, Yang Zhang, Zhou Li | Published: 2023-10-16

Improved Flow Recovery from Packet Data

Authors: Anthony Kenyon, David Elizondo, Lipika Deka | Published: 2023-10-15

ChatGPT for Vulnerability Detection, Classification, and Repair: How Far Are We?

Authors: Michael Fu, Chakkrit Tantithamthavorn, Van Nguyen, Trung Le | Published: 2023-10-15

Securing the Digital World: Protecting smart infrastructures and digital industries with Artificial Intelligence (AI)-enabled malware and intrusion detection

Authors: Marc Schmitt | Published: 2023-10-15

Digital Deception: Generative Artificial Intelligence in Social Engineering and Phishing

Authors: Marc Schmitt, Ivan Flechais | Published: 2023-10-15

Private Synthetic Data Meets Ensemble Learning

Authors: Haoyuan Sun, Navid Azizan, Akash Srivastava, Hao Wang | Published: 2023-10-15

A Blockchain-empowered Multi-Aggregator Federated Learning Architecture in Edge Computing with Deep Reinforcement Learning Optimization

Authors: Xiao Li, Weili Wu | Published: 2023-10-14

BufferSearch: Generating Black-Box Adversarial Texts With Lower Queries

Authors: Wenjie Lv, Zhen Wang, Yitao Zheng, Zhehua Zhong, Qi Xuan, Tianyi Chen | Published: 2023-10-14