Machine learning attack on copy detection patterns: are 1×1 patterns cloneable?

Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 | Updated: 2021-10-06

Label differential privacy via clustering

Authors: Hossein Esfandiari, Vahab Mirrokni, Umar Syed, Sergei Vassilvitskii | Published: 2021-10-05

An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment

Authors: Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze | Published: 2021-10-05

Mobile authentication of copy detection patterns: how critical is to know fakes?

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05

Dataset: Large-scale Urban IoT Activity Data for DDoS Attack Emulation

Authors: Arvin Hekmati, Eugenio Grippo, Bhaskar Krishnamachari | Published: 2021-10-05

An energy-based model for neuro-symbolic reasoning on knowledge graphs

Authors: Dominik Dold, Josep Soler Garrido | Published: 2021-10-04

Automating Privilege Escalation with Deep Reinforcement Learning

Authors: Kalle Kujanpää, Willie Victor, Alexander Ilin | Published: 2021-10-04

Leaked-Web: Accurate and Efficient Machine Learning-Based Website Fingerprinting Attack through Hardware Performance Counters

Authors: Han Wang | Published: 2021-10-04

SecFL: Confidential Federated Learning using TEEs

Authors: Do Le Quoc, Christof Fetzer | Published: 2021-10-03 | Updated: 2021-10-07

Evaluating Deep Learning Models and Adversarial Attacks on Accelerometer-Based Gesture Authentication

Authors: Elliu Huang, Fabio Di Troia, Mark Stamp | Published: 2021-10-03