The importance of feature preprocessing for differentially private linear optimization

Authors: Ziteng Sun, Ananda Theertha Suresh, Aditya Krishna Menon | Published: 2023-07-19 | Updated: 2024-02-19

Rethinking Backdoor Attacks

Authors: Alaa Khaddaj, Guillaume Leclerc, Aleksandar Makelov, Kristian Georgiev, Hadi Salman, Andrew Ilyas, Aleksander Madry | Published: 2023-07-19

Eliminating Label Leakage in Tree-Based Vertical Federated Learning

Authors: Hideaki Takahashi, Jingjing Liu, Yang Liu | Published: 2023-07-19 | Updated: 2023-10-22

Application of BadNets in Spam Filters

Authors: Swagnik Roychoudhury, Akshaj Kumar Veldanda | Published: 2023-07-18

CBSeq: A Channel-level Behavior Sequence For Encrypted Malware Traffic Detection

Authors: Susu Cui, Cong Dong, Meng Shen, Yuling Liu, Bo Jiang, Zhigang Lu | Published: 2023-07-18

Discretization-based ensemble model for robust learning in IoT

Authors: Anahita Namvar, Chandra Thapa, Salil S. Kanhere | Published: 2023-07-18

Privacy-preserving patient clustering for personalized federated learning

Authors: Ahmed Elhussein, Gamze Gursoy | Published: 2023-07-17

G-Scan: Graph Neural Networks for Line-Level Vulnerability Identification in Smart Contracts

Authors: Christoph Sendner, Ruisi Zhang, Alexander Hefter, Alexandra Dmitrienko, Farinaz Koushanfar | Published: 2023-07-17

Metadata-based Malware Detection on Android using Machine Learning

Authors: Alexander Hefter, Christoph Sendner, Alexandra Dmitrienko | Published: 2023-07-17

Hidden Markov Models with Random Restarts vs Boosting for Malware Detection

Authors: Aditya Raghavan, Fabio Di Troia, Mark Stamp | Published: 2023-07-17