A Modern Analysis of Aging Machine Learning Based IoT Cybersecurity Methods

Authors: Sam Strecker, Rushit Dave, Nyle Siddiqui, Naeem Seliya | Published: 2021-10-15

Machine Learning Algorithms In User Authentication Schemes

Authors: Laura Pryor, Rushit Dave, Naeem Seliya, Evelyn R Sowells Boone | Published: 2021-10-15

A Survey of Machine Learning Algorithms for Detecting Ransomware Encryption Activity

Authors: Erik Larsen, David Noever, Korey MacVittie | Published: 2021-10-14

Resource-constrained Federated Edge Learning with Heterogeneous Data: Formulation and Analysis

Authors: Yi Liu, Yuanshao Zhu, James J. Q. Yu | Published: 2021-10-14

Bandwidth Utilization Side-Channel on ML Inference Accelerators

Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2021-10-14

AI Total: Analyzing Security ML Models with Imperfect Data in Production

Authors: Awalin Sopan, Konstantin Berlin | Published: 2021-10-13

Poison Forensics: Traceback of Data Poisoning Attacks in Neural Networks

Authors: Shawn Shan, Arjun Nitin Bhagoji, Haitao Zheng, Ben Y. Zhao | Published: 2021-10-13 | Updated: 2022-06-15

Infinitely Divisible Noise in the Low Privacy Regime

Authors: Rasmus Pagh, Nina Mesing Stausholm | Published: 2021-10-13 | Updated: 2022-03-07

Not all noise is accounted equally: How differentially private learning benefits from large sampling rates

Authors: Friedrich Dörmann, Osvald Frisk, Lars Nørvang Andersen, Christian Fischer Pedersen | Published: 2021-10-12

On the Security Risks of AutoML

Authors: Ren Pang, Zhaohan Xi, Shouling Ji, Xiapu Luo, Ting Wang | Published: 2021-10-12