Mithridates: Auditing and Boosting Backdoor Resistance of Machine Learning Pipelines

Authors: Eugene Bagdasaryan, Vitaly Shmatikov | Published: 2023-02-09 | Updated: 2023-12-19

Continuous Learning for Android Malware Detection

Authors: Yizheng Chen, Zhoujie Ding, David Wagner | Published: 2023-02-08 | Updated: 2023-06-14

CodeLMSec Benchmark: Systematically Evaluating and Finding Security Vulnerabilities in Black-Box Code Language Models

Authors: Hossein Hajipour, Keno Hassler, Thorsten Holz, Lea Schönherr, Mario Fritz | Published: 2023-02-08 | Updated: 2023-10-23

Temporal Robustness against Data Poisoning

Authors: Wenxiao Wang, Soheil Feizi | Published: 2023-02-07 | Updated: 2023-12-06

SoK: A Systematic Evaluation of Backdoor Trigger Characteristics in Image Classification

Authors: Gorka Abad, Jing Xu, Stefanos Koffas, Behrad Tajalli, Stjepan Picek, Mauro Conti | Published: 2023-02-03 | Updated: 2023-04-21

Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation

Authors: Hyoungwook Nam, Raghavendra Pradyumna Pothukuchi, Bo Li, Nam Sung Kim, Josep Torrellas | Published: 2023-02-03 | Updated: 2023-10-14

Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation

Authors: Noel Loo, Ramin Hasani, Mathias Lechner, Alexander Amini, Daniela Rus | Published: 2023-02-02 | Updated: 2023-11-09

On the Efficacy of Differentially Private Few-shot Image Classification

Authors: Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela | Published: 2023-02-02 | Updated: 2023-12-19

In-Context Retrieval-Augmented Language Models

Authors: Ori Ram, Yoav Levine, Itay Dalmedigos, Dor Muhlgay, Amnon Shashua, Kevin Leyton-Brown, Yoav Shoham | Published: 2023-01-31 | Updated: 2023-08-01

Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis

Authors: Chuanpu Fu, Qi Li, Ke Xu | Published: 2023-01-31