Stealing and Evading Malware Classifiers and Antivirus at Low False Positive Conditions

Authors: Maria Rigaki, Sebastian Garcia | Published: 2022-04-13 | Updated: 2023-06-04

Machine Learning Security against Data Poisoning: Are We There Yet?

Authors: Antonio Emanuele Cinà, Kathrin Grosse, Ambra Demontis, Battista Biggio, Fabio Roli, Marcello Pelillo | Published: 2022-04-12 | Updated: 2024-03-08

Training a Helpful and Harmless Assistant with Reinforcement Learning from Human Feedback

Authors: Yuntao Bai, Andy Jones, Kamal Ndousse, Amanda Askell, Anna Chen, Nova DasSarma, Dawn Drain, Stanislav Fort, Deep Ganguli, Tom Henighan, Nicholas Joseph, Saurav Kadavath, Jackson Kernion, Tom Conerly, Sheer El-Showk, Nelson Elhage, Zac Hatfield-Dodds, Danny Hernandez, Tristan Hume, Scott Johnston, Shauna Kravec, Liane Lovitt, Neel Nanda, Catherine Olsson, Dario Amodei, Tom Brown, Jack Clark, Sam McCandlish, Chris Olah, Ben Mann, Jared Kaplan | Published: 2022-04-12

Distributed learning optimisation of Cox models can leak patient data: Risks and solutions

Authors: Carsten Brink, Christian Rønn Hansen, Matthew Field, Gareth Price, David Thwaites, Nis Sarup, Uffe Bernchou, Lois Holloway | Published: 2022-04-12

Malware Analysis with Symbolic Execution and Graph Kernel

Authors: Charles-Henry Bertrand Van Ouytsel, Axel Legay | Published: 2022-04-12

Scalable privacy-preserving cancer type prediction with homomorphic encryption

Authors: Esha Sarkar, Eduardo Chielle, Gamze Gursoy, Leo Chen, Mark Gerstein, Michail Maniatakos | Published: 2022-04-12

SoK: Privacy Preserving Machine Learning using Functional Encryption: Opportunities and Challenges

Authors: Prajwal Panzade, Daniel Takabi | Published: 2022-04-11 | Updated: 2022-09-02

Stability and Generalization of Differentially Private Minimax Problems

Authors: Yilin Kang, Yong Liu, Jian Li, Weiping Wang | Published: 2022-04-11 | Updated: 2022-04-22

Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach

Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam | Published: 2022-04-11

BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis

Authors: Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo | Published: 2022-04-10 | Updated: 2022-05-05