Robust Quantity-Aware Aggregation for Federated Learning

Authors: Jingwei Yi, Fangzhao Wu, Huishuai Zhang, Bin Zhu, Tao Qi, Guangzhong Sun, Xing Xie | Published: 2022-05-22 | Updated: 2023-07-26

Robust Sensible Adversarial Learning of Deep Neural Networks for Image Classification

Authors: Jungeum Kim, Xiao Wang | Published: 2022-05-20

Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness

Authors: Jiankai Jin, Olga Ohrimenko, Benjamin I. P. Rubinstein | Published: 2022-05-20 | Updated: 2024-09-09

SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning

Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08

Focused Adversarial Attacks

Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19

Differential Privacy: What is all the noise about?

Authors: Roxana Danger | Published: 2022-05-19

A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection

Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18

Adaptive Hybrid Heterogeneous IDS for 6LoWPAN

Authors: Aryan Mohammadi Pasikhani, John A Clark, Prosanta Gope | Published: 2022-05-18

Backdoor Attacks on Bayesian Neural Networks using Reverse Distribution

Authors: Zhixin Pan, Prabhat Mishra | Published: 2022-05-18

SoK: The Impact of Unlabelled Data in Cyberthreat Detection

Authors: Giovanni Apruzzese, Pavel Laskov, Aliya Tastemirova | Published: 2022-05-18