Scalable Whitebox Attacks on Tree-based Models

Authors: Giuseppe Castiglione, Gavin Ding, Masoud Hashemi, Christopher Srinivasa, Ga Wu | Published: 2022-03-31

Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets

Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini | Published: 2022-03-31 | Updated: 2022-10-06

Efficient Dropout-resilient Aggregation for Privacy-preserving Machine Learning

Authors: Ziyao Liu, Jiale Guo, Kwok-Yan Lam, Jun Zhao | Published: 2022-03-31

Differentially Private Federated Learning via Reconfigurable Intelligent Surface

Authors: Yuhan Yang, Yong Zhou, Youlong Wu, Yuanming Shi | Published: 2022-03-31

Privacy-Preserving Aggregation in Federated Learning: A Survey

Authors: Ziyao Liu, Jiale Guo, Wenzhuo Yang, Jiani Fan, Kwok-Yan Lam, Jun Zhao | Published: 2022-03-31 | Updated: 2022-07-13

Ransomware Detection using Process Memory

Authors: Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter | Published: 2022-03-31

Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems

Authors: Min Wang, Song Wang, Jiankun Hu | Published: 2022-03-31

Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems

Authors: Sankha Baran Dutta, Hoda Naghibijouybari, Arjun Gupta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker | Published: 2022-03-30

NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image Caption Generation Models

Authors: Simin Chen, Zihe Song, Mirazul Haque, Cong Liu, Wei Yang | Published: 2022-03-29

Attacker Attribution of Audio Deepfakes

Authors: Nicolas M. Müller, Franziska Dieckmann, Jennifer Williams | Published: 2022-03-28