Augmentation Backdoors

Authors: Joseph Rance, Yiren Zhao, Ilia Shumailov, Robert Mullins | Published: 2022-09-29

No Free Lunch in “Privacy for Free: How does Dataset Condensation Help Privacy”

Authors: Nicholas Carlini, Vitaly Feldman, Milad Nasr | Published: 2022-09-29

Anomaly localization for copy detection patterns through print estimations

Authors: Brian Pulfer, Yury Belousov, Joakim Tutt, Roman Chaban, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-09-29

A Closer Look at Evaluating the Bit-Flip Attack Against Deep Neural Networks

Authors: Kevin Hector, Mathieu Dumont, Pierre-Alain Moellic, Jean-Max Dutertre | Published: 2022-09-28 | Updated: 2022-09-30

Anomaly detection optimization using big data and deep learning to reduce false-positive

Authors: Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki | Published: 2022-09-28

A Snapshot of the Frontiers of Client Selection in Federated Learning

Authors: Gergely Dániel Németh, Miguel Ángel Lozano, Novi Quadrianto, Nuria Oliver | Published: 2022-09-27 | Updated: 2023-01-02

Preprint: Privacy-preserving IoT Data Sharing Scheme

Authors: Ali Abdullah S. AlQahtani, Hosam Alamleh, Reem Alrawili | Published: 2022-09-26

FaRO 2: an Open Source, Configurable Smart City Framework for Real-Time Distributed Vision and Biometric Systems

Authors: Joel Brogan, Nell Barber, David Cornett, David Bolme | Published: 2022-09-26

Deep Learning-based Anonymization of Chest Radiographs: A Utility-preserving Measure for Patient Privacy

Authors: Kai Packhäuser, Sebastian Gündel, Florian Thamm, Felix Denzinger, Andreas Maier | Published: 2022-09-23 | Updated: 2023-07-24

Privacy Attacks Against Biometric Models with Fewer Samples: Incorporating the Output of Multiple Models

Authors: Sohaib Ahmad, Benjamin Fuller, Kaleel Mahmood | Published: 2022-09-22