Quantum Differential Privacy: An Information Theory Perspective

Authors: Christoph Hirche, Cambyse Rouzé, Daniel Stilck França | Published: 2022-02-22 | Updated: 2023-04-06

ICSML: Industrial Control Systems ML Framework for native inference using IEC 61131-3 code

Authors: Constantine Doumanidis, Prashant Hari Narayan Rajput, Michail Maniatakos | Published: 2022-02-21 | Updated: 2023-04-21

Toward More Generalized Malicious URL Detection Models

Authors: YunDa Tsai, Cayon Liow, Yin Sheng Siang, Shou-De Lin | Published: 2022-02-21 | Updated: 2024-02-09

Transferring Adversarial Robustness Through Robust Representation Matching

Authors: Pratik Vaishnavi, Kevin Eykholt, Amir Rahmati | Published: 2022-02-21 | Updated: 2022-05-05

NetSentry: A Deep Learning Approach to Detecting Incipient Large-scale Network Attacks

Authors: Haoyu Liu, Paul Patras | Published: 2022-02-20 | Updated: 2022-04-20

Assessment of Cyber-Physical Intrusion Detection and Classification for Industrial Control Systems

Authors: Nils Müller, Charalampos Ziras, Kai Heussen | Published: 2022-02-18 | Updated: 2023-01-03

An Equivalence Between Data Poisoning and Byzantine Gradient Attacks

Authors: Sadegh Farhadkhani, Rachid Guerraoui, Lê-Nguyên Hoang, Oscar Villemaud | Published: 2022-02-17 | Updated: 2022-07-20

Understanding and Improving Graph Injection Attack by Promoting Unnoticeability

Authors: Yongqiang Chen, Han Yang, Yonggang Zhang, Kaili Ma, Tongliang Liu, Bo Han, James Cheng | Published: 2022-02-16 | Updated: 2022-04-05

Privacy-preserving Similarity Calculation of Speaker Features Using Fully Homomorphic Encryption

Authors: Yogachandran Rahulamathavan | Published: 2022-02-16 | Updated: 2022-03-14

SecGNN: Privacy-Preserving Graph Neural Network Training and Inference as a Cloud Service

Authors: Songlei Wang, Yifeng Zheng, Xiaohua Jia | Published: 2022-02-16 | Updated: 2023-01-31