A Learning Assisted Method for Uncovering Power Grid Generation and Distribution System Vulnerabilities

Authors: Suman Maiti, Anjana B, Sunandan Adhikary, Ipsita Koley, Soumyajit Dey | Published: 2023-06-15

PLAN: Variance-Aware Private Mean Estimation

Authors: Martin Aumüller, Christian Janos Lebeda, Boel Nelson, Rasmus Pagh | Published: 2023-06-14 | Updated: 2024-04-10

Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions

Authors: Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum | Published: 2023-06-14 | Updated: 2024-04-16

Fairness and Privacy-Preserving in Federated Learning: A Survey

Authors: Taki Hasan Rafi, Faiza Anan Noor, Tahmid Hussain, Dong-Kyu Chae | Published: 2023-06-14 | Updated: 2023-07-14

Is there a Trojan! : Literature survey and critical evaluation of the latest ML based modern intrusion detection systems in IoT environments

Authors: Vishal Karanam | Published: 2023-06-14

Protecting User Privacy in Remote Conversational Systems: A Privacy-Preserving framework based on text sanitization

Authors: Zhigang Kan, Linbo Qiao, Hao Yu, Liwen Peng, Yifu Gao, Dongsheng Li | Published: 2023-06-14

ChatGPT vs. Lightweight Security: First Work Implementing the NIST Cryptographic Standard ASCON

Authors: Alvaro Cintas-Canto, Jasmin Kaur, Mehran Mozaffari-Kermani, Reza Azarderakhsh | Published: 2023-06-13

Theoretical Foundations of Adversarially Robust Learning

Authors: Omar Montasser | Published: 2023-06-13

Few-shot Multi-domain Knowledge Rearming for Context-aware Defence against Advanced Persistent Threats

Authors: Gaolei Li, Yuanyuan Zhao, Wenqi Wei, Yuchen Liu | Published: 2023-06-13 | Updated: 2023-06-14

Differentially Private One Permutation Hashing and Bin-wise Consistent Weighted Sampling

Authors: Xiaoyun Li, Ping Li | Published: 2023-06-13