A New Implementation of Federated Learning for Privacy and Security Enhancement

Authors: Xiang Ma, Haijian Sun, Rose Qingyang Hu, Yi Qian | Published: 2022-08-03

On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel

Authors: Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra | Published: 2022-08-01 | Updated: 2024-02-17

DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning

Authors: Mohammad Hossein Samavatian, Saikat Majumdar, Kristin Barber, Radu Teodorescu | Published: 2022-07-31

Verifiable Encodings for Secure Homomorphic Analytics

Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux | Published: 2022-07-28 | Updated: 2024-06-04

Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation

Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2022-07-28 | Updated: 2023-07-27

Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset

Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala | Published: 2022-07-27

Membership Inference Attacks via Adversarial Examples

Authors: Hamid Jalalzai, Elie Kadoche, Rémi Leluc, Vincent Plassier | Published: 2022-07-27 | Updated: 2022-11-23

Fine-grained Private Knowledge Distillation

Authors: Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang | Published: 2022-07-27 | Updated: 2023-04-06

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception

Authors: Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu | Published: 2022-07-26

LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity

Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen | Published: 2022-07-26