Empowering Graph Representation Learning with Test-Time Graph Transformation

Authors: Wei Jin, Tong Zhao, Jiayuan Ding, Yozen Liu, Jiliang Tang, Neil Shah | Published: 2022-10-07 | Updated: 2023-02-26

mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications

Authors: David Monschein, Oliver P. Waldhorst | Published: 2022-10-07

Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems

Authors: Chawin Sitawarin, Florian Tramèr, Nicholas Carlini | Published: 2022-10-07 | Updated: 2023-07-20

Network Intrusion Detection System in a Light Bulb

Authors: Liam Daly Manocchio, Siamak Layeghy, Marius Portmann | Published: 2022-10-06

Federated Boosted Decision Trees with Differential Privacy

Authors: Samuel Maddock, Graham Cormode, Tianhao Wang, Carsten Maple, Somesh Jha | Published: 2022-10-06

Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet Detection

Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Muhammad Khalid, Husnain Rafiq | Published: 2022-10-06

DReS-FL: Dropout-Resilient Secure Federated Learning for Non-IID Clients via Secret Data Sharing

Authors: Jiawei Shao, Yuchang Sun, Songze Li, Jun Zhang | Published: 2022-10-06

A Closer Look at Robustness to L-infinity and Spatial Perturbations and their Composition

Authors: Luke Rowe, Benjamin Thérien, Krzysztof Czarnecki, Hongyang Zhang | Published: 2022-10-05

Common Vulnerability Scoring System Prediction based on Open Source Intelligence Information Sources

Authors: Philipp Kuehn, David N. Relke, Christian Reuter | Published: 2022-10-05

Bicoptor: Two-round Secure Three-party Non-linear Computation without Preprocessing for Privacy-preserving Machine Learning

Authors: Lijing Zhou, Ziyu Wang, Hongrui Cui, Qingrui Song, Yu Yu | Published: 2022-10-05 | Updated: 2024-04-19