RORL: Robust Offline Reinforcement Learning via Conservative Smoothing

Authors: Rui Yang, Chenjia Bai, Xiaoteng Ma, Zhaoran Wang, Chongjie Zhang, Lei Han | Published: 2022-06-06 | Updated: 2022-10-22

Deep Reinforcement Learning for Cybersecurity Threat Detection and Protection: A Review

Authors: Mohit Sewak, Sanjay K. Sahay, Hemant Rathore | Published: 2022-06-06

Spam Detection Using BERT

Authors: Thaer Sahmoud, Mohammad Mikki | Published: 2022-06-06 | Updated: 2022-06-07

Leveraging Machine Learning for Ransomware Detection

Authors: Nanda Rani, Sunita Vikrant Dhavale | Published: 2022-06-04

A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks

Authors: Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed S. Alkatheiri, Yu Zhuang | Published: 2022-06-02

Defense Against Gradient Leakage Attacks via Learning to Obscure Data

Authors: Yuxuan Wan, Han Xu, Xiaorui Liu, Jie Ren, Wenqi Fan, Jiliang Tang | Published: 2022-06-01

Federated Learning in Non-IID Settings Aided by Differentially Private Synthetic Data

Authors: Huancheng Chen, Haris Vikalo | Published: 2022-06-01 | Updated: 2023-04-20

Differentially Private Shapley Values for Data Evaluation

Authors: Lauren Watson, Rayna Andreeva, Hao-Tsung Yang, Rik Sarkar | Published: 2022-06-01

Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration

Authors: Gibran Gomez, Pedro Moreno-Sanchez, Juan Caballero | Published: 2022-06-01 | Updated: 2022-10-18

Privacy for Free: How does Dataset Condensation Help Privacy?

Authors: Tian Dong, Bo Zhao, Lingjuan Lyu | Published: 2022-06-01