Using Autoencoders on Differentially Private Federated Learning GANs

Authors: Gregor Schram, Rui Wang, Kaitai Liang | Published: 2022-06-24

Adversarial Robustness of Deep Neural Networks: A Survey from a Formal Verification Perspective

Authors: Mark Huasong Meng, Guangdong Bai, Sin Gee Teo, Zhe Hou, Yan Xiao, Yun Lin, Jin Song Dong | Published: 2022-06-24 | Updated: 2022-10-11

“You Can’t Fix What You Can’t Measure”: Privately Measuring Demographic Performance Disparities in Federated Learning

Authors: Marc Juarez, Aleksandra Korolova | Published: 2022-06-24 | Updated: 2023-01-11

Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach

Authors: Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-06-23 | Updated: 2022-06-25

LBDMIDS: LSTM Based Deep Learning Model for Intrusion Detection Systems for IoT Networks

Authors: Kumar Saurabh, Saksham Sood, P. Aditya Kumar, Uphar Singh, Ranjana Vyas, O. P. Vyas, Rahamatullah Khondoker | Published: 2022-06-23

A Framework for Understanding Model Extraction Attack and Defense

Authors: Xun Xian, Mingyi Hong, Jie Ding | Published: 2022-06-23

Vulnerability Prioritization: An Offensive Security Approach

Authors: Muhammed Fatih Bulut, Abdulhamid Adebayo, Daby Sow, Steve Ocepek | Published: 2022-06-22

Attack Techniques and Threat Identification for Vulnerabilities

Authors: Constantin Adam, Muhammed Fatih Bulut, Daby Sow, Steven Ocepek, Chris Bedell, Lilian Ngweta | Published: 2022-06-22

Multi-party Secure Broad Learning System for Privacy Preserving

Authors: Xiao-Kai Cao, Chang-Dong Wang, Jian-Huang Lai, Qiong Huang, C. L. Philip Chen | Published: 2022-06-22

ROSE: A RObust and SEcure DNN Watermarking

Authors: Kassem Kallas, Teddy Furon | Published: 2022-06-22