DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting

Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig | Published: 2022-07-15

Mobile Keystroke Biometrics Using Transformers

Authors: Giuseppe Stragapede, Paula Delgado-Santos, Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Aythami Morales | Published: 2022-07-15 | Updated: 2022-10-04

Suppressing Poisoning Attacks on Federated Learning for Medical Imaging

Authors: Naif Alkhunaizi, Dmitry Kamzolov, Martin Takáč, Karthik Nandakumar | Published: 2022-07-15

Smooth Anonymity for Sparse Graphs

Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale | Published: 2022-07-13

A Personalised User Authentication System based on EEG Signals

Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14

Game of Trojans: A Submodular Byzantine Approach

Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-07-13

dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation

Authors: Sofiane Mahiou, Kai Xu, Georgi Ganev | Published: 2022-07-12

RelaxLoss: Defending Membership Inference Attacks without Losing Utility

Authors: Dingfan Chen, Ning Yu, Mario Fritz | Published: 2022-07-12

Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware

Authors: Luca Demetrio, Battista Biggio, Fabio Roli | Published: 2022-07-12