HyperImpute: Generalized Iterative Imputation with Automatic Model Selection

Authors: Daniel Jarrett, Bogdan Cebere, Tennison Liu, Alicia Curth, Mihaela van der Schaar | Published: 2022-06-15

Reconstructing Training Data from Trained Neural Networks

Authors: Niv Haim, Gal Vardi, Gilad Yehudai, Ohad Shamir, Michal Irani | Published: 2022-06-15 | Updated: 2022-12-05

Learn to Adapt: Robust Drift Detection in Security Domain

Authors: Aditya Kuppa, Nhien-An Le-Khac | Published: 2022-06-15

YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

Authors: Stefan More, Lukas Alber | Published: 2022-06-15

Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection

Authors: Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete | Published: 2022-06-15

On the explainable properties of 1-Lipschitz Neural Networks: An Optimal Transport Perspective

Authors: Mathieu Serrurier, Franck Mamalet, Thomas Fel, Louis Béthune, Thibaut Boissin | Published: 2022-06-14 | Updated: 2024-02-02

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt | Published: 2022-06-13

Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification

Authors: Daniel Gibert, Carles Mateu, Jordi Planes, Quan Le | Published: 2022-06-12

Darknet Traffic Classification and Adversarial Attacks

Authors: Nhien Rust-Nguyen, Mark Stamp | Published: 2022-06-12

Rethinking the Defense Against Free-rider Attack From the Perspective of Model Weight Evolving Frequency

Authors: Jinyin Chen, Mingjun Li, Tao Liu, Haibin Zheng, Yao Cheng, Changting Lin | Published: 2022-06-11