Distributed learning optimisation of Cox models can leak patient data: Risks and solutions

Authors: Carsten Brink, Christian Rønn Hansen, Matthew Field, Gareth Price, David Thwaites, Nis Sarup, Uffe Bernchou, Lois Holloway | Published: 2022-04-12

Malware Analysis with Symbolic Execution and Graph Kernel

Authors: Charles-Henry Bertrand Van Ouytsel, Axel Legay | Published: 2022-04-12

Scalable privacy-preserving cancer type prediction with homomorphic encryption

Authors: Esha Sarkar, Eduardo Chielle, Gamze Gursoy, Leo Chen, Mark Gerstein, Michail Maniatakos | Published: 2022-04-12

SoK: Privacy Preserving Machine Learning using Functional Encryption: Opportunities and Challenges

Authors: Prajwal Panzade, Daniel Takabi | Published: 2022-04-11 | Updated: 2022-09-02

Stability and Generalization of Differentially Private Minimax Problems

Authors: Yilin Kang, Yong Liu, Jian Li, Weiping Wang | Published: 2022-04-11 | Updated: 2022-04-22

Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach

Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam | Published: 2022-04-11

BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis

Authors: Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo | Published: 2022-04-10 | Updated: 2022-05-05

An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks

Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08

HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection

Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann | Published: 2022-04-08

Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses

Authors: Satwik Kundu, Swaroop Ghosh | Published: 2022-04-07