Certified Robust Neural Networks: Generalization and Corruption Resistance

Authors: Amine Bennouna, Ryan Lucas, Bart Van Parys | Published: 2023-03-03 | Updated: 2023-05-18

Automated Machine Learning for Deep Learning based Malware Detection

Authors: Austin Brown, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-03-03 | Updated: 2023-11-03

Enhancing Vulnerability Prioritization: Data-Driven Exploit Predictions with Community-Driven Insights

Authors: Jay Jacobs, Sasha Romanosky, Octavian Suciu, Benjamin Edwards, Armin Sarabi | Published: 2023-02-27 | Updated: 2023-06-15

From Noisy Fixed-Point Iterations to Private ADMM for Centralized and Federated Learning

Authors: Edwige Cyffers, Aurélien Bellet, Debabrota Basu | Published: 2023-02-24 | Updated: 2023-07-12

Harnessing the Speed and Accuracy of Machine Learning to Advance Cybersecurity

Authors: Khatoon Mohammed | Published: 2023-02-24 | Updated: 2024-03-02

On the Hardness of Robustness Transfer: A Perspective from Rademacher Complexity over Symmetric Difference Hypothesis Space

Authors: Yuyang Deng, Nidham Gazagnadou, Junyuan Hong, Mehrdad Mahdavi, Lingjuan Lyu | Published: 2023-02-23

Not what you’ve signed up for: Compromising Real-World LLM-Integrated Applications with Indirect Prompt Injection

Authors: Kai Greshake, Sahar Abdelnabi, Shailesh Mishra, Christoph Endres, Thorsten Holz, Mario Fritz | Published: 2023-02-23 | Updated: 2023-05-05

PAD: Towards Principled Adversarial Malware Detection Against Evasion Attacks

Authors: Deqiang Li, Shicheng Cui, Yun Li, Jia Xu, Fu Xiao, Shouhuai Xu | Published: 2023-02-22 | Updated: 2023-04-06

MultiRobustBench: Benchmarking Robustness Against Multiple Attacks

Authors: Sihui Dai, Saeed Mahloujifar, Chong Xiang, Vikash Sehwag, Pin-Yu Chen, Prateek Mittal | Published: 2023-02-21 | Updated: 2023-07-20

Generalization Bounds for Adversarial Contrastive Learning

Authors: Xin Zou, Weiwei Liu | Published: 2023-02-21