DRL-GAN: A Hybrid Approach for Binary and Multiclass Network Intrusion Detection

Authors: Caroline Strickland, Chandrika Saha, Muhammad Zakar, Sareh Nejad, Noshin Tasnim, Daniel Lizotte, Anwar Haque | Published: 2023-01-05

Enhancement attacks in biomedical machine learning

Authors: Matthew Rosenblatt, Javid Dadashkarimi, Dustin Scheinost | Published: 2023-01-05 | Updated: 2023-08-16

Privacy and Efficiency of Communications in Federated Split Learning

Authors: Zongshun Zhang, Andrea Pinto, Valeria Turina, Flavio Esposito, Ibrahim Matta | Published: 2023-01-04 | Updated: 2023-01-07

Backdoor Attacks Against Dataset Distillation

Authors: Yugeng Liu, Zheng Li, Michael Backes, Yun Shen, Yang Zhang | Published: 2023-01-03

Analysis of Label-Flip Poisoning Attack on Machine Learning Based Malware Detector

Authors: Kshitiz Aryal, Maanak Gupta, Mahmoud Abdelsalam | Published: 2023-01-03

Ranking Differential Privacy

Authors: Shirong Xu, Will Wei Sun, Guang Cheng | Published: 2023-01-02

Unlocking Metaverse-as-a-Service The three pillars to watch: Privacy and Security, Edge Computing, and Blockchain

Authors: Vesal Ahsani, Ali Rahimi, Mehdi Letafati, Babak Hossein Khalaj | Published: 2023-01-01 | Updated: 2023-01-11

DPack: Efficiency-Oriented Privacy Budget Scheduling

Authors: Pierre Tholoniat, Kelly Kostopoulou, Mosharaf Chowdhury, Asaf Cidon, Roxana Geambasu, Mathias Lécuyer, Junfeng Yang | Published: 2022-12-26 | Updated: 2024-10-10

SoK: Let the Privacy Games Begin! A Unified Treatment of Data Inference Privacy in Machine Learning

Authors: Ahmed Salem, Giovanni Cherubin, David Evans, Boris Köpf, Andrew Paverd, Anshuman Suri, Shruti Tople, Santiago Zanella-Béguelin | Published: 2022-12-21 | Updated: 2023-04-20

Learned Systems Security

Authors: Roei Schuster, Jin Peng Zhou, Thorsten Eisenhofer, Paul Grubbs, Nicolas Papernot | Published: 2022-12-20 | Updated: 2023-01-10