To Collaborate or Not in Distributed Statistical Estimation with Resource Constraints?

Authors: Yu-Zhen Janice Chen, Daniel S. Menasche, Don Towsley | Published: 2022-05-31

Private Federated Submodel Learning with Sparsification

Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-05-31

Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems

Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12

Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement

Authors: Alex Shamis, Peter Pietzuch, Antoine Delignat-Lavaud, Andrew Paverd, Manuel Costa | Published: 2022-05-31

Integrity Authentication in Tree Models

Authors: Weijie Zhao, Yingjie Lao, Ping Li | Published: 2022-05-30 | Updated: 2022-06-23

White-box Membership Attack Against Machine Learning Based Retinopathy Classification

Authors: Mounia Hamidouche, Reda Bellafqira, Gwenolé Quellec, Gouenou Coatrieux | Published: 2022-05-30

Evaluating Automated Driving Planner Robustness against Adversarial Influence

Authors: Andres Molina-Markham, Silvia G. Ionescu, Erin Lanus, Derek Ng, Sam Sommerer, Joseph J. Rushanan | Published: 2022-05-29

A Blessing of Dimensionality in Membership Inference through Regularization

Authors: Jasper Tan, Daniel LeJeune, Blake Mason, Hamid Javadi, Richard G. Baraniuk | Published: 2022-05-27 | Updated: 2023-04-14

Auditing Differential Privacy in High Dimensions with the Kernel Quantum Rényi Divergence

Authors: Carles Domingo-Enrich, Youssef Mroueh | Published: 2022-05-27

How to Peel a Million: Validating and Expanding Bitcoin Clusters

Authors: George Kappos, Haaroon Yousaf, Rainer Stütz, Sofia Rollet, Bernhard Haslhofer, Sarah Meiklejohn | Published: 2022-05-27