Node-Level Differentially Private Graph Neural Networks

Authors: Ameya Daigavane, Gagan Madan, Aditya Sinha, Abhradeep Guha Thakurta, Gaurav Aggarwal, Prateek Jain | Published: 2021-11-23 | Updated: 2022-08-26

Is this IoT Device Likely to be Secure? Risk Score Prediction for IoT Devices Using Gradient Boosting Machines

Authors: Carlos A. Rivera Alvarez, Arash Shaghaghi, David D. Nguyen, Salil S. Kanhere | Published: 2021-11-23

A Comparison of State-of-the-Art Techniques for Generating Adversarial Malware Binaries

Authors: Prithviraj Dasgupta, Zachariah Osman | Published: 2021-11-22

NTD: Non-Transferability Enabled Backdoor Detection

Authors: Yinshan Li, Hua Ma, Zhi Zhang, Yansong Gao, Alsharif Abuadbba, Anmin Fu, Yifeng Zheng, Said F. Al-Sarawi, Derek Abbott | Published: 2021-11-22

Evaluating Adversarial Attacks on ImageNet: A Reality Check on Misclassification Classes

Authors: Utku Ozbulak, Maura Pintor, Arnout Van Messem, Wesley De Neve | Published: 2021-11-22

Adversarial Mask: Real-World Universal Adversarial Attack on Face Recognition Model

Authors: Alon Zolfi, Shai Avidan, Yuval Elovici, Asaf Shabtai | Published: 2021-11-21 | Updated: 2022-09-07

Understanding Training-Data Leakage from Gradients in Neural Networks for Image Classification

Authors: Cangxiong Chen, Neill D. F. Campbell | Published: 2021-11-19

Fooling Adversarial Training with Inducing Noise

Authors: Zhirui Wang, Yifei Wang, Yisen Wang | Published: 2021-11-19

A Review of Adversarial Attack and Defense for Classification Methods

Authors: Yao Li, Minhao Cheng, Cho-Jui Hsieh, Thomas C. M. Lee | Published: 2021-11-18

Enhanced Membership Inference Attacks against Machine Learning Models

Authors: Jiayuan Ye, Aadyaa Maddi, Sasi Kumar Murakonda, Vincent Bindschaedler, Reza Shokri | Published: 2021-11-18 | Updated: 2022-09-13