Membership Inference Attacks and Defenses in Neural Network Pruning

Authors: Xiaoyong Yuan, Lan Zhang | Published: 2022-02-07 | Updated: 2022-08-03

Efficient Privacy Preserving Logistic Regression for Horizontally Distributed Data

Authors: Guanhong Miao | Published: 2022-02-05 | Updated: 2022-07-20

Improved Certified Defenses against Data Poisoning with (Deterministic) Finite Aggregation

Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-02-05 | Updated: 2022-07-14

Training Differentially Private Models with Secure Multiparty Computation

Authors: Sikha Pentyala, Davis Railsback, Ricardo Maia, Rafael Dowsley, David Melanson, Anderson Nascimento, Martine De Cock | Published: 2022-02-05 | Updated: 2022-09-01

Linear Model Against Malicious Adversaries with Local Differential Privacy

Authors: Guanhong Miao, A. Adam Ding, Samuel S. Wu | Published: 2022-02-05 | Updated: 2022-06-29

Pixle: a fast and effective black-box attack based on rearranging pixels

Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2022-02-04

A Robust Phased Elimination Algorithm for Corruption-Tolerant Gaussian Process Bandits

Authors: Ilija Bogunovic, Zihan Li, Andreas Krause, Jonathan Scarlett | Published: 2022-02-03 | Updated: 2022-03-28

Byzantine-Robust Decentralized Learning via ClippedGossip

Authors: Lie He, Sai Praneeth Karimireddy, Martin Jaggi | Published: 2022-02-03 | Updated: 2023-04-20

Parameters or Privacy: A Provable Tradeoff Between Overparameterization and Membership Inference

Authors: Jasper Tan, Blake Mason, Hamid Javadi, Richard G. Baraniuk | Published: 2022-02-02 | Updated: 2022-11-30

Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks

Authors: Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger | Published: 2022-01-31 | Updated: 2022-04-25