Machine and Deep Learning for IoT Security and Privacy: Applications, Challenges, and Future Directions

Authors: Subrato Bharati, Prajoy Podder | Published: 2022-10-24

Perfectly Secure Steganography Using Minimum Entropy Coupling

Authors: Christian Schroeder de Witt, Samuel Sokota, J. Zico Kolter, Jakob Foerster, Martin Strohmeier | Published: 2022-10-24 | Updated: 2023-10-30

Ares: A System-Oriented Wargame Framework for Adversarial ML

Authors: Farhan Ahmed, Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-10-24

Blockchain and Machine Learning for Fraud Detection: A Privacy-Preserving and Adaptive Incentive Based Approach

Authors: Tahmid Hasan Pranto, Kazi Tamzid Akhter Md Hasib, Tahsinur Rahman, AKM Bahalul Haque, A. K. M. Najmul Islam, Rashedur M. Rahman | Published: 2022-10-23

Learning The Likelihood Test With One-Class Classifiers for Physical Layer Authentication

Authors: Francesco Ardizzon, Stefano Tomasin | Published: 2022-10-22 | Updated: 2024-08-04

The privacy issue of counterfactual explanations: explanation linkage attacks

Authors: Sofie Goethals, Kenneth Sörensen, David Martens | Published: 2022-10-21

Evolution of Neural Tangent Kernels under Benign and Adversarial Training

Authors: Noel Loo, Ramin Hasani, Alexander Amini, Daniela Rus | Published: 2022-10-21

Extracted BERT Model Leaks More Information than You Think!

Authors: Xuanli He, Chen Chen, Lingjuan Lyu, Qiongkai Xu | Published: 2022-10-21 | Updated: 2022-10-31

New data poison attacks on machine learning classifiers for mobile exfiltration

Authors: Miguel A. Ramirez, Sangyoung Yoon, Ernesto Damiani, Hussam Al Hamadi, Claudio Agostino Ardagna, Nicola Bena, Young-Ji Byon, Tae-Yeon Kim, Chung-Suk Cho, Chan Yeob Yeun | Published: 2022-10-20

Do Software Security Practices Yield Fewer Vulnerabilities?

Authors: Nusrat Zahan, Shohanuzzaman Shohan, Dan Harris, Laurie Williams | Published: 2022-10-20 | Updated: 2023-06-15