Flurry: a Fast Framework for Reproducible Multi-layered Provenance Graph Representation Learning

Authors: Maya Kapoor, Joshua Melton, Michael Ridenhour, Mahalavanya Sriram, Thomas Moyer, Siddharth Krishnan | Published: 2022-03-05

Mobile authentication of copy detection patterns

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2022-03-04 | Updated: 2022-05-18

Training language models to follow instructions with human feedback

Authors: Long Ouyang, Jeff Wu, Xu Jiang, Diogo Almeida, Carroll L. Wainwright, Pamela Mishkin, Chong Zhang, Sandhini Agarwal, Katarina Slama, Alex Ray, John Schulman, Jacob Hilton, Fraser Kelton, Luke Miller, Maddie Simens, Amanda Askell, Peter Welinder, Paul Christiano, Jan Leike, Ryan Lowe | Published: 2022-03-04

Adversarial Patterns: Building Robust Android Malware Classifiers

Authors: Dipkamal Bhusal, Nidhi Rastogi | Published: 2022-03-04 | Updated: 2024-04-12

Dynamic Backdoors with Global Average Pooling

Authors: Stefanos Koffas, Stjepan Picek, Mauro Conti | Published: 2022-03-04

Differentially Private Label Protection in Split Learning

Authors: Xin Yang, Jiankai Sun, Yuanshun Yao, Junyuan Xie, Chong Wang | Published: 2022-03-04

Why adversarial training can hurt robust accuracy

Authors: Jacob Clarysse, Julia Hörrmann, Fanny Yang | Published: 2022-03-03

Label Leakage and Protection from Forward Embedding in Vertical Federated Learning

Authors: Jiankai Sun, Xin Yang, Yuanshun Yao, Chong Wang | Published: 2022-03-02 | Updated: 2022-05-25

Adversarial attacks on neural networks through canonical Riemannian foliations

Authors: Eliot Tron, Nicolas Couellan, Stéphane Puechmorel | Published: 2022-03-02 | Updated: 2024-09-18

PUMA: Performance Unchanged Model Augmentation for Training Data Removal

Authors: Ga Wu, Masoud Hashemi, Christopher Srinivasa | Published: 2022-03-02