Large Scale Transfer Learning for Differentially Private Image Classification

Authors: Harsh Mehta, Abhradeep Thakurta, Alexey Kurakin, Ashok Cutkosky | Published: 2022-05-06 | Updated: 2022-05-20

Holistic Approach to Measure Sample-level Adversarial Vulnerability and its Utility in Building Trustworthy Systems

Authors: Gaurav Kumar Nayak, Ruchit Rawal, Rohit Lal, Himanshu Patil, Anirban Chakraborty | Published: 2022-05-05

Provably Confidential Language Modelling

Authors: Xuandong Zhao, Lei Li, Yu-Xiang Wang | Published: 2022-05-04 | Updated: 2022-06-23

Universal Optimality and Robust Utility Bounds for Metric Differential Privacy

Authors: Natasha Fernandes, Annabelle McIver, Catuscia Palamidessi, Ming Ding | Published: 2022-05-03

Performance Weighting for Robust Federated Learning Against Corrupted Sources

Authors: Dimitris Stripelis, Marcin Abram, Jose Luis Ambite | Published: 2022-05-02

Reducing the Cost of Training Security Classifier (via Optimized Semi-Supervised Learning)

Authors: Rui Shu, Tianpei Xia, Huy Tu, Laurie Williams, Tim Menzies | Published: 2022-05-02

A Word is Worth A Thousand Dollars: Adversarial Attack on Tweets Fools Stock Predictions

Authors: Yong Xie, Dakuo Wang, Pin-Yu Chen, Jinjun Xiong, Sijia Liu, Sanmi Koyejo | Published: 2022-05-01 | Updated: 2022-07-12

Combined Learning of Neural Network Weights for Privacy in Collaborative Tasks

Authors: Aline R. Ioste, Alan M. Durham, Marcelo Finger | Published: 2022-04-30

Symbolic analysis meets federated learning to enhance malware identifier

Authors: Khanh Huu The Dam, Charles-Henry Bertrand Van Ouytsel, Axel Legay | Published: 2022-04-29

Adversarial attacks on an optical neural network

Authors: Shuming Jiao, Ziwei Song, Shuiying Xiang | Published: 2022-04-29