Don’t Generate Me: Training Differentially Private Generative Models with Sinkhorn Divergence

Authors: Tianshi Cao, Alex Bie, Arash Vahdat, Sanja Fidler, Karsten Kreis | Published: 2021-11-01 | Updated: 2021-11-29

Availability Attacks Create Shortcuts

Authors: Da Yu, Huishuai Zhang, Wei Chen, Jian Yin, Tie-Yan Liu | Published: 2021-11-01 | Updated: 2022-06-02

FuCE: Fuzzing+Concolic Execution guided Trojan Detection in Synthesizable Hardware Designs

Authors: Mukta Debnath, Animesh Basak Chowdhury, Debasri Saha, Susmita Sur-Kolay | Published: 2021-11-01

Explainable Artificial Intelligence for Smart City Application: A Secure and Trusted Platform

Authors: M. Humayn Kabir, Khondokar Fida Hasan, Mohammad Kamrul Hasan, Keyvan Ansari | Published: 2021-10-31

Efficient passive membership inference attack in federated learning

Authors: Oualid Zari, Chuan Xu, Giovanni Neglia | Published: 2021-10-31

Autoencoder-based Anomaly Detection in Smart Farming Ecosystem

Authors: Mary Adkisson, Jeffrey C Kimmel, Maanak Gupta, Mahmoud Abdelsalam | Published: 2021-10-29

Evaluation of an Anomaly Detector for Routers using Parameterizable Malware in an IoT Ecosystem

Authors: John Carter, Spiros Mancoridis | Published: 2021-10-29

A Comprehensive Study on Learning-Based PE Malware Family Classification Methods

Authors: Yixuan Ma, Shuang Liu, Jiajun Jiang, Guanhong Chen, Keqiu Li | Published: 2021-10-29

On the Use of CSI for the Generation of RF Fingerprints and Secret Keys

Authors: Muralikrishnan Srinivasan, Sotiris Skaperas, Arsenia Chorti | Published: 2021-10-28

Federated Learning with Heterogeneous Differential Privacy

Authors: Nasser Aldaghri, Hessam Mahdavifar, Ahmad Beirami | Published: 2021-10-28 | Updated: 2023-01-14