You Don’t Know My Favorite Color: Preventing Dialogue Representations from Revealing Speakers’ Private Personas

Authors: Haoran Li, Yangqiu Song, Lixin Fan | Published: 2022-04-26

Towards Data-Free Model Stealing in a Hard Label Setting

Authors: Sunandini Sanyal, Sravanti Addepalli, R. Venkatesh Babu | Published: 2022-04-23

GFCL: A GRU-based Federated Continual Learning Framework against Data Poisoning Attacks in IoV

Authors: Anum Talpur, Mohan Gurusamy | Published: 2022-04-23 | Updated: 2022-09-12

Towards Privacy-Preserving Neural Architecture Search

Authors: Fuyi Wang, Leo Yu Zhang, Lei Pan, Shengshan Hu, Robin Doss | Published: 2022-04-22

Block Hunter: Federated Learning for Cyber Threat Hunting in Blockchain-based IIoT Networks

Authors: Abbas Yazdinejad, Ali Dehghantanha, Reza M. Parizi, Mohammad Hammoudeh, Hadis Karimipour, Gautam Srivastava | Published: 2022-04-21

ARLIF-IDS — Attention augmented Real-Time Isolation Forest Intrusion Detection System

Authors: Aman Priyanshu, Sarthak Shastri, Sai Sravan Medicherla | Published: 2022-04-20

Backdooring Explainable Machine Learning

Authors: Maximilian Noppel, Lukas Peter, Christian Wressnegger | Published: 2022-04-20

Exploration of Machine Learning Classification Models Used for Behavioral Biometrics Authentication

Authors: Sara Kokal, Laura Pryor, Rushit Dave | Published: 2022-04-19

A Survey and Perspective on Artificial Intelligence for Security-Aware Electronic Design Automation

Authors: David Selasi Koblah, Rabin Yu Acharya, Daniel Capecci, Olivia P. Dizon-Paradis, Shahin Tajik, Fatemeh Ganji, Damon L. Woodard, Domenic Forte | Published: 2022-04-19 | Updated: 2022-04-21

Automatic Hardware Trojan Insertion using Machine Learning

Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18