On the Discredibility of Membership Inference Attacks

Authors: Shahbaz Rezaei, Xin Liu | Published: 2022-12-06 | Updated: 2023-04-28

StyleGAN as a Utility-Preserving Face De-identification Method

Authors: Seyyed Mohammad Sadegh Moosavi Khorzooghi, Shirin Nilizadeh | Published: 2022-12-05 | Updated: 2023-08-31

Pareto Regret Analyses in Multi-objective Multi-armed Bandit

Authors: Mengfan Xu, Diego Klabjan | Published: 2022-12-01 | Updated: 2023-05-30

HashVFL: Defending Against Data Reconstruction Attacks in Vertical Federated Learning

Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Chong Fu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-01-22

Hijack Vertical Federated Learning Models As One Party

Authors: Pengyu Qiu, Xuhong Zhang, Shouling Ji, Changjiang Li, Yuwen Pu, Xing Yang, Ting Wang | Published: 2022-12-01 | Updated: 2024-02-16

Tight Certification of Adversarially Trained Neural Networks via Nonconvex Low-Rank Semidefinite Relaxations

Authors: Hong-Ming Chiu, Richard Y. Zhang | Published: 2022-11-30 | Updated: 2023-06-14

Targets in Reinforcement Learning to solve Stackelberg Security Games

Authors: Saptarashmi Bandyopadhyay, Chenqi Zhu, Philip Daniel, Joshua Morrison, Ethan Shay, John Dickerson | Published: 2022-11-30

Traditional Classification Neural Networks are Good Generators: They are Competitive with DDPMs and GANs

Authors: Guangrun Wang, Philip H. S. Torr | Published: 2022-11-27 | Updated: 2022-12-08

SoK: Secure Human-centered Wireless Sensing

Authors: Wei Sun, Tingjun Chen, Neil Gong | Published: 2022-11-22 | Updated: 2024-03-09

Privacy in Practice: Private COVID-19 Detection in X-Ray Images (Extended Version)

Authors: Lucas Lange, Maja Schneider, Peter Christen, Erhard Rahm | Published: 2022-11-21 | Updated: 2023-04-26