Membership Inference Attacks via Adversarial Examples

Authors: Hamid Jalalzai, Elie Kadoche, Rémi Leluc, Vincent Plassier | Published: 2022-07-27 | Updated: 2022-11-23

Fine-grained Private Knowledge Distillation

Authors: Yuntong Li, Shaowei Wang, Yingying Wang, Jin Li, Yuqiu Qian, Bangzhou Xin, Wei Yang | Published: 2022-07-27 | Updated: 2023-04-06

Perception-Aware Attack: Creating Adversarial Music via Reverse-Engineering Human Perception

Authors: Rui Duan, Zhe Qu, Shangqing Zhao, Leah Ding, Yao Liu, Zhuo Lu | Published: 2022-07-26

LGV: Boosting Adversarial Example Transferability from Large Geometric Vicinity

Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen | Published: 2022-07-26

Generative Extraction of Audio Classifiers for Speaker Identification

Authors: Tejumade Afonja, Lucas Bourtoule, Varun Chandrasekaran, Sageev Oore, Nicolas Papernot | Published: 2022-07-26

$p$-DkNN: Out-of-Distribution Detection Through Statistical Testing of Deep Representations

Authors: Adam Dziedzic, Stephan Rabanser, Mohammad Yaghini, Armin Ale, Murat A. Erdogdu, Nicolas Papernot | Published: 2022-07-25

Semi-Leak: Membership Inference Attacks Against Semi-supervised Learning

Authors: Xinlei He, Hongbin Liu, Neil Zhenqiang Gong, Yang Zhang | Published: 2022-07-25

SecretGen: Privacy Recovery on Pre-Trained Models via Distribution Discrimination

Authors: Zhuowen Yuan, Fan Wu, Yunhui Long, Chaowei Xiao, Bo Li | Published: 2022-07-25

Multi-Level Fine-Tuning, Data Augmentation, and Few-Shot Learning for Specialized Cyber Threat Intelligence

Authors: Markus Bayer, Tobias Frey, Christian Reuter | Published: 2022-07-22

Applying Machine Learning on RSRP-based Features for False Base Station Detection

Authors: Prajwol Kumar Nakarmi, Jakob Sternby, Ikram Ullah | Published: 2022-07-22