An Embarrassingly Simple Backdoor Attack on Self-supervised Learning

Authors: Changjiang Li, Ren Pang, Zhaohan Xi, Tianyu Du, Shouling Ji, Yuan Yao, Ting Wang | Published: 2022-10-13 | Updated: 2023-08-14

DE-FAKE: Detection and Attribution of Fake Images Generated by Text-to-Image Generation Models

Authors: Zeyang Sha, Zheng Li, Ning Yu, Yang Zhang | Published: 2022-10-13 | Updated: 2023-01-09

Federated Learning for Tabular Data: Exploring Potential Risk to Privacy

Authors: Han Wu, Zilong Zhao, Lydia Y. Chen, Aad van Moorsel | Published: 2022-10-13

COLLIDER: A Robust Training Framework for Backdoor Data

Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2022-10-13

Anomaly Detection via Federated Learning

Authors: Marc Vucovich, Amogh Tarcar, Penjo Rebelo, Narendra Gade, Ruchi Porwal, Abdul Rahman, Christopher Redino, Kevin Choi, Dhruv Nandakumar, Robert Schiller, Edward Bowen, Alex West, Sanmitra Bhattacharya, Balaji Veeramani | Published: 2022-10-12

BLADERUNNER: Rapid Countermeasure for Synthetic (AI-Generated) StyleGAN Faces

Authors: Adam Dorian Wong | Published: 2022-10-12 | Updated: 2022-10-28

Detecting Hidden Attackers in Photovoltaic Systems Using Machine Learning

Authors: Suman Sourav, Partha P. Biswas, Binbin Chen, Daisuke Mashima | Published: 2022-10-11

Boosting Adversarial Robustness From The Perspective of Effective Margin Regularization

Authors: Ziquan Liu, Antoni B. Chan | Published: 2022-10-11

Do you pay for Privacy in Online learning?

Authors: Amartya Sanyal, Giorgia Ramponi | Published: 2022-10-10

Demystifying Quantum Blockchain for Healthcare

Authors: Keshav Kaushik, Adarsh Kumar | Published: 2022-10-07