l-Leaks: Membership Inference Attacks with Logits

Authors: Shuhao Li, Yajie Wang, Yuanzhang Li, Yu-an Tan | Published: 2022-05-13

A Comprehensive Benchmark Suite for Intel SGX

Authors: Sandeep Kumar, Abhisek Panda, Smruti R. Sarangi | Published: 2022-05-13

How to Combine Membership-Inference Attacks on Multiple Updated Models

Authors: Matthew Jagielski, Stanley Wu, Alina Oprea, Jonathan Ullman, Roxana Geambasu | Published: 2022-05-12

Sample Complexity Bounds for Robustly Learning Decision Lists against Evasion Attacks

Authors: Pascale Gourdeau, Varun Kanade, Marta Kwiatkowska, James Worrell | Published: 2022-05-12

Secure Aggregation for Federated Learning in Flower

Authors: Kwing Hei Li, Pedro Porto Buarque de Gusmão, Daniel J. Beutel, Nicholas D. Lane | Published: 2022-05-12

Privacy-Preserving Distributed Machine Learning Made Faster

Authors: Zoe L. Jiang, Jiajing Gu, Hongxiao Wang, Yulin Wu, Junbin Fang, Siu-Ming Yiu, Wenjian Luo, Xuan Wang | Published: 2022-05-12

Extensible Machine Learning for Encrypted Network Traffic Application Labeling via Uncertainty Quantification

Authors: Steven Jorgensen, John Holodnak, Jensen Dempsey, Karla de Souza, Ananditha Raghunath, Vernon Rivet, Noah DeMoes, Andrés Alejos, Allan Wollaber | Published: 2022-05-11 | Updated: 2023-10-06

DNS based In-Browser Cryptojacking Detection

Authors: Rohit Kumar Sachan, Rachit Agarwal, Sandeep Kumar Shukla | Published: 2022-05-10

Do You Think You Can Hold Me? The Real Challenge of Problem-Space Evasion Attacks

Authors: Harel Berger, Amit Dvir, Chen Hajaj, Rony Ronen | Published: 2022-05-09

Btech thesis report on adversarial attack detection and purification of adverserially attacked images

Authors: Dvij Kalaria | Published: 2022-05-09