QUDOS: Quorum-Based Cloud-Edge Distributed DNNs for Security Enhanced Industry 4.0

Authors: Kevin Wallis, Christoph Reich, Blesson Varghese, Christian Schindelhauer | Published: 2021-11-09

Data privacy protection in microscopic image analysis for material data mining

Authors: Boyuan Ma, Xiang Yin, Xiaojuan Ban, Haiyou Huang, Neng Zhang, Hao Wang, Weihua Xue | Published: 2021-11-09

The Role of Adaptive Optimizers for Honest Private Hyperparameter Selection

Authors: Shubhankar Mohapatra, Sajin Sasy, Xi He, Gautam Kamath, Om Thakkar | Published: 2021-11-09

Distribution-Invariant Differential Privacy

Authors: Xuan Bi, Xiaotong Shen | Published: 2021-11-08 | Updated: 2022-06-06

Bayesian Framework for Gradient Leakage

Authors: Mislav Balunović, Dimitar I. Dimitrov, Robin Staab, Martin Vechev | Published: 2021-11-08 | Updated: 2022-03-17

HAPSSA: Holistic Approach to PDF Malware Detection Using Signal and Statistical Analysis

Authors: Tajuddin Manhar Mohammed, Lakshmanan Nataraj, Satish Chikkagoudar, Shivkumar Chandrasekaran, B. S. Manjunath | Published: 2021-11-08

Robust and Information-theoretically Safe Bias Classifier against Adversarial Attacks

Authors: Lijia Yu, Xiao-Shan Gao | Published: 2021-11-08 | Updated: 2022-02-14

Get a Model! Model Hijacking Attack Against Machine Learning Models

Authors: Ahmed Salem, Michael Backes, Yang Zhang | Published: 2021-11-08

Graph Robustness Benchmark: Benchmarking the Adversarial Robustness of Graph Machine Learning

Authors: Qinkai Zheng, Xu Zou, Yuxiao Dong, Yukuo Cen, Da Yin, Jiarong Xu, Yang Yang, Jie Tang | Published: 2021-11-08

An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy

Authors: Daniel Fraunholz, Marc Zimmermann, Hans D. Schotten | Published: 2021-11-06