Negative Results of Fusing Code and Documentation for Learning to Accurately Identify Sensitive Source and Sink Methods An Application to the Android Framework for Data Leak Detection

Authors: Jordan Samhi, Maria Kober, Abdoul Kader Kabore, Steven Arzt, Tegawendé F. Bissyandé, Jacques Klein | Published: 2023-01-09 | Updated: 2023-01-11

Introducing Model Inversion Attacks on Automatic Speaker Recognition

Authors: Karla Pizzi, Franziska Boenisch, Ugur Sahin, Konstantin Böttinger | Published: 2023-01-09

IronForge: An Open, Secure, Fair, Decentralized Federated Learning

Authors: Guangsheng Yu, Xu Wang, Caijun Sun, Qin Wang, Ping Yu, Wei Ni, Ren Ping Liu, Xiwei Xu | Published: 2023-01-07

Linear and non-linear machine learning attacks on physical unclonable functions

Authors: Michael Lachner | Published: 2023-01-06

TrojanPuzzle: Covertly Poisoning Code-Suggestion Models

Authors: Hojjat Aghakhani, Wei Dai, Andre Manoel, Xavier Fernandes, Anant Kharkar, Christopher Kruegel, Giovanni Vigna, David Evans, Ben Zorn, Robert Sim | Published: 2023-01-06 | Updated: 2024-01-24

DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection

Authors: Caroline Strickland, Chandrika Saha, Muhammad Zakar, Sareh Nejad, Noshin Tasnim, Daniel Lizotte, Anwar Haque | Published: 2023-01-05

Enhancement attacks in biomedical machine learning

Authors: Matthew Rosenblatt, Javid Dadashkarimi, Dustin Scheinost | Published: 2023-01-05 | Updated: 2023-08-16

Privacy and Efficiency of Communications in Federated Split Learning

Authors: Zongshun Zhang, Andrea Pinto, Valeria Turina, Flavio Esposito, Ibrahim Matta | Published: 2023-01-04 | Updated: 2023-01-07

Backdoor Attacks Against Dataset Distillation

Authors: Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-01-03

Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector

Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03