Proof of Unlearning: Definitions and Instantiation

Authors: Jiasi Weng, Shenglong Yao, Yuefeng Du, Junjie Huang, Jian Weng, Cong Wang | Published: 2022-10-20 | Updated: 2022-10-21

How Does a Deep Learning Model Architecture Impact Its Privacy? A Comprehensive Study of Privacy Attacks on CNNs and Transformers

Authors: Guangsheng Zhang, Bo Liu, Huan Tian, Tianqing Zhu, Ming Ding, Wanlei Zhou | Published: 2022-10-20 | Updated: 2024-02-02

A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends

Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07

Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial Queries

Authors: Yuxin Wen, Arpit Bansal, Hamid Kazemi, Eitan Borgnia, Micah Goldblum, Jonas Geiping, Tom Goldstein | Published: 2022-10-19 | Updated: 2023-06-01

An Empirical Analysis of SMS Scam Detection Systems

Authors: Muhammad Salman, Muhammad Ikram, Mohamed Ali Kaafar | Published: 2022-10-19

Differentially Private Diffusion Models

Authors: Tim Dockhorn, Tianshi Cao, Arash Vahdat, Karsten Kreis | Published: 2022-10-18 | Updated: 2023-12-31

MaSS: Multi-attribute Selective Suppression

Authors: Chun-Fu Chen, Shaohan Hu, Zhonghao Shi, Prateek Gulati, Bill Moriarty, Marco Pistoia, Vincenzo Piuri, Pierangela Samarati | Published: 2022-10-18 | Updated: 2022-10-24

Scaling Adversarial Training to Large Perturbation Bounds

Authors: Sravanti Addepalli, Samyak Jain, Gaurang Sriramanan, R. Venkatesh Babu | Published: 2022-10-18

DPIS: An Enhanced Mechanism for Differentially Private SGD with Importance Sampling

Authors: Jianxin Wei, Ergute Bao, Xiaokui Xiao, Yin Yang | Published: 2022-10-18 | Updated: 2024-08-01

Towards Generating Adversarial Examples on Mixed-type Data

Authors: Han Xu, Menghai Pan, Zhimeng Jiang, Huiyuan Chen, Xiaoting Li, Mahashweta Das, Hao Yang | Published: 2022-10-17