Defensive ML: Defending Architectural Side-channels with Adversarial Obfuscation

Authors: Hyoungwook Nam, Raghavendra Pradyumna Pothukuchi, Bo Li, Nam Sung Kim, Josep Torrellas | Published: 2023-02-03 | Updated: 2023-10-14

Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation

Authors: Noel Loo, Ramin Hasani, Mathias Lechner, Alexander Amini, Daniela Rus | Published: 2023-02-02 | Updated: 2023-11-09

On the Efficacy of Differentially Private Few-shot Image Classification

Authors: Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela | Published: 2023-02-02 | Updated: 2023-12-19

In-Context Retrieval-Augmented Language Models

Authors: Ori Ram, Yoav Levine, Itay Dalmedigos, Dor Muhlgay, Amnon Shashua, Kevin Leyton-Brown, Yoav Shoham | Published: 2023-01-31 | Updated: 2023-08-01

Detecting Unknown Encrypted Malicious Traffic in Real Time via Flow Interaction Graph Analysis

Authors: Chuanpu Fu, Qi Li, Ke Xu | Published: 2023-01-31

Machine Learning and Port Scans: A Systematic Review

Authors: Jason M. Pittman | Published: 2023-01-31

Privacy Preserving Ultra-Short-term Wind Power Prediction Based on Secure Multi Party Computation

Authors: Hang Fan, Xiaoyu Fan, Tianyi Hao, Wei Wei, Kun Chen, Guosai Wang, Xiaofeng Jia, Yidong Li, Wei Xu | Published: 2023-01-31

Robust Linear Regression: Gradient-descent, Early-stopping, and Beyond

Authors: Meyer Scetbon, Elvis Dohmatob | Published: 2023-01-31

Behavioural Reports of Multi-Stage Malware

Authors: Marcus Carpenter, Chunbo Luo | Published: 2023-01-30

Feature-Space Bayesian Adversarial Learning Improved Malware Detector Robustness

Authors: Bao Gia Doan, Shuiqiao Yang, Paul Montague, Olivier De Vel, Tamas Abraham, Seyit Camtepe, Salil S. Kanhere, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2023-01-30