Privacy-Preserving Reinforcement Learning Beyond Expectation

Authors: Arezoo Rajabi, Bhaskar Ramasubramanian, Abdullah Al Maruf, Radha Poovendran | Published: 2022-03-18

Botnets Breaking Transformers: Localization of Power Botnet Attacks Against the Distribution Grid

Authors: Lynn Pepin, Lizhi Wang, Jiangwei Wang, Songyang Han, Pranav Pishawikar, Amir Herzberg, Peng Zhang, Fei Miao | Published: 2022-03-18

AdIoTack: Quantifying and Refining Resilience of Decision Tree Ensemble Inference Models against Adversarial Volumetric Attacks on IoT Networks

Authors: Arman Pashamokhtari, Gustavo Batista, Hassan Habibi Gharakheili | Published: 2022-03-18

Towards an AI-Driven Universal Anti-Jamming Solution with Convolutional Interference Cancellation Network

Authors: Hai N. Nguyen, Guevara Noubir | Published: 2022-03-18

Machine Learning for Encrypted Malicious Traffic Detection: Approaches, Datasets and Comparative Study

Authors: Zihao Wang, Kar-Wai Fok, Vrizlynn L. L. Thing | Published: 2022-03-17

SoK: Differential Privacy on Graph-Structured Data

Authors: Tamara T. Mueller, Dmitrii Usynin, Johannes C. Paetzold, Daniel Rueckert, Georgios Kaissis | Published: 2022-03-17

On the Use of Fine-grained Vulnerable Code Statements for Software Vulnerability Assessment Models

Authors: Triet H. M. Le, M. Ali Babar | Published: 2022-03-16

Semi-FedSER: Semi-supervised Learning for Speech Emotion Recognition On Federated Learning using Multiview Pseudo-Labeling

Authors: Tiantian Feng, Shrikanth Narayanan | Published: 2022-03-15

Threat Detection for General Social Engineering Attack Using Machine Learning Techniques

Authors: Zuoguang Wang, Yimo Ren, Hongsong Zhu, Limin Sun | Published: 2022-03-15 | Updated: 2022-03-17

A Framework for Verifiable and Auditable Federated Anomaly Detection

Authors: Gabriele Santin, Inna Skarbovsky, Fabiana Fournier, Bruno Lepri | Published: 2022-03-15