DeltaBound Attack: Efficient decision-based attack in low queries regime

Authors: Lorenzo Rossi | Published: 2022-10-01

ML for Location Prediction Using RSSI On WiFi 2.4 GHZ Frequency Band

Authors: Ali Abdullah S. AlQahtani, Nazim Choudhury | Published: 2022-10-01

ImpNet: Imperceptible and blackbox-undetectable backdoors in compiled neural networks

Authors: Eleanor Clifford, Ilia Shumailov, Yiren Zhao, Ross Anderson, Robert Mullins | Published: 2022-09-30 | Updated: 2024-03-01

Blockchain-based Monitoring for Poison Attack Detection in Decentralized Federated Learning

Authors: Ranwa Al Mallah, David Lopez | Published: 2022-09-30

Augmentation Backdoors

Authors: Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert Mullins | Published: 2022-09-29

No Free Lunch in “Privacy for Free: How does Dataset Condensation Help Privacy”

Authors: Nicholas Carlini, Vitaly Feldman, Milad Nasr | Published: 2022-09-29

Anomaly localization for copy detection patterns through print estimations

Authors: Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-09-29

A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks

Authors: Kevin Hector, Mathieu Dumont, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2022-09-28 | Updated: 2022-09-30

Anomaly detection optimization using big data and deep learning to reduce false-positive

Authors: Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki | Published: 2022-09-28

A Snapshot of the Frontiers of Client Selection in Federated Learning

Authors: Gergely Dániel Németh, Miguel Ángel Lozano, Novi Quadrianto, Nuria Oliver | Published: 2022-09-27 | Updated: 2023-01-02