BlindFL: Vertical Federated Machine Learning without Peeking into Your Data

Authors: Fangcheng Fu, Huanran Xue, Yong Cheng, Yangyu Tao, Bin Cui | Published: 2022-06-16

Architectural Backdoors in Neural Networks

Authors: Mikel Bober-Irizar, Ilia Shumailov, Yiren Zhao, Robert Mullins, Nicolas Papernot | Published: 2022-06-15

HyperImpute: Generalized Iterative Imputation with Automatic Model Selection

Authors: Daniel Jarrett, Bogdan Cebere, Tennison Liu, Alicia Curth, Mihaela van der Schaar | Published: 2022-06-15

Reconstructing Training Data from Trained Neural Networks

Authors: Niv Haim, Gal Vardi, Gilad Yehudai, Ohad Shamir, Michal Irani | Published: 2022-06-15 | Updated: 2022-12-05

Learn to Adapt: Robust Drift Detection in Security Domain

Authors: Aditya Kuppa, Nhien-An Le-Khac | Published: 2022-06-15

YOU SHALL NOT COMPUTE on my Data: Access Policies for Privacy-Preserving Data Marketplaces and an Implementation for a Distributed Market using MPC

Authors: Stefan More, Lukas Alber | Published: 2022-06-15

Morphence-2.0: Evasion-Resilient Moving Target Defense Powered by Out-of-Distribution Detection

Authors: Abderrahmen Amich, Ata Kaboudi, Birhanu Eshete | Published: 2022-06-15

On the explainable properties of 1-Lipschitz Neural Networks: An Optimal Transport Perspective

Authors: Mathieu Serrurier, Franck Mamalet, Thomas Fel, Louis Béthune, Thibaut Boissin | Published: 2022-06-14 | Updated: 2024-02-02

Deploying Convolutional Networks on Untrusted Platforms Using 2D Holographic Reduced Representations

Authors: Mohammad Mahmudul Alam, Edward Raff, Tim Oates, James Holt | Published: 2022-06-13

Fusing Feature Engineering and Deep Learning: A Case Study for Malware Classification

Authors: Daniel Gibert, Carles Mateu, Jordi Planes, Quan Le | Published: 2022-06-12