Linear Model Against Malicious Adversaries with Local Differential Privacy

Authors: Guanhong Miao, A. Adam Ding, Samuel S. Wu | Published: 2022-02-05 | Updated: 2022-06-29

Pixle: a fast and effective black-box attack based on rearranging pixels

Authors: Jary Pomponi, Simone Scardapane, Aurelio Uncini | Published: 2022-02-04

A Robust Phased Elimination Algorithm for Corruption-Tolerant Gaussian Process Bandits

Authors: Ilija Bogunovic, Zihan Li, Andreas Krause, Jonathan Scarlett | Published: 2022-02-03 | Updated: 2022-03-28

Byzantine-Robust Decentralized Learning via ClippedGossip

Authors: Lie He, Sai Praneeth Karimireddy, Martin Jaggi | Published: 2022-02-03 | Updated: 2023-04-20

Parameters or Privacy: A Provable Tradeoff Between Overparameterization and Membership Inference

Authors: Jasper Tan, Blake Mason, Hamid Javadi, Richard G. Baraniuk | Published: 2022-02-02 | Updated: 2022-11-30

Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks

Authors: Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger | Published: 2022-01-31 | Updated: 2022-04-25

Cryptocurrency Valuation: An Explainable AI Approach

Authors: Yulin Liu, Luyao Zhang | Published: 2022-01-30 | Updated: 2023-07-08

Transfer Learning In Differential Privacy’s Hybrid-Model

Authors: Refael Kohen, Or Sheffet | Published: 2022-01-28 | Updated: 2022-06-16

SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders

Authors: Tianshuo Cong, Xinlei He, Yang Zhang | Published: 2022-01-27 | Updated: 2022-08-31

An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications

Authors: Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota | Published: 2022-01-26 | Updated: 2022-04-16