A Closer Look at Robustness to L-infinity and Spatial Perturbations and their Composition

Authors: Luke Rowe, Benjamin Thérien, Krzysztof Czarnecki, Hongyang Zhang | Published: 2022-10-05

Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources

Authors: Philipp Kuehn, David N. Relke, Christian Reuter | Published: 2022-10-05

Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning

Authors: Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu | Published: 2022-10-05 | Updated: 2024-04-19

Practical Adversarial Attacks on Spatiotemporal Traffic Forecasting Models

Authors: Fan Liu, Hao Liu, Wenzhao Jiang | Published: 2022-10-05

Split Federated Learning on Micro-controllers: A Keyword Spotting Showcase

Authors: Jingtao Li, Runcong Kuang | Published: 2022-10-04

On the Robustness of Deep Clustering Models: Adversarial Attacks and Defenses

Authors: Anshuman Chhabra, Ashwin Sekhari, Prasant Mohapatra | Published: 2022-10-04

Recycling Scraps: Improving Private Learning by Leveraging Intermediate Checkpoints

Authors: Virat Shejwalkar, Arun Ganesh, Rajiv Mathews, Yarong Mu, Shuang Song, Om Thakkar, Abhradeep Thakurta, Xinyi Zheng | Published: 2022-10-04 | Updated: 2024-09-17

Lightweight Strategy for XOR PUFs as Security Primitives for Resource-constrained IoT device

Authors: Gaoxiang Li, Khalid T. Mursi, Yu Zhuang | Published: 2022-10-04

Certified Data Removal in Sum-Product Networks

Authors: Alexander Becker, Thomas Liebig | Published: 2022-10-04

NeuDep: Neural Binary Memory Dependence Analysis

Authors: Kexin Pei, Dongdong She, Michael Wang, Scott Geng, Zhou Xuan, Yaniv David, Junfeng Yang, Suman Jana, Baishakhi Ray | Published: 2022-10-04