Inference Attacks Against Graph Neural Networks

Authors: Zhikun Zhang, Min Chen, Michael Backes, Yun Shen, Yang Zhang | Published: 2021-10-06

Stegomalware: A Systematic Survey of MalwareHiding and Detection in Images, Machine LearningModels and Research Challenges

Authors: Rajasekhar Chaganti, Vinayakumar Ravi, Mamoun Alazab, Tuan D. Pham | Published: 2021-10-06

Task-aware Privacy Preservation for Multi-dimensional Data

Authors: Jiangnan Cheng, Ao Tang, Sandeep Chinchali | Published: 2021-10-05 | Updated: 2022-08-08

A Systematic Survey of Blockchained Federated Learning

Authors: Zhilin Wang, Qin Hu, Minghui Xu, Yan Zhuang, Yawei Wang, Xiuzhen Cheng | Published: 2021-10-05 | Updated: 2024-06-01

Machine learning attack on copy detection patterns: are 1×1 patterns cloneable?

Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 | Updated: 2021-10-06

Label differential privacy via clustering

Authors: Hossein Esfandiari, Vahab Mirrokni, Umar Syed, Sergei Vassilvitskii | Published: 2021-10-05

An Approach of Replicating Multi-Staged Cyber-Attacks and Countermeasures in a Smart Grid Co-Simulation Environment

Authors: Ömer Sen, Dennis van der Velde, Sebastian N. Peters, Martin Henze | Published: 2021-10-05

Mobile authentication of copy detection patterns: how critical is to know fakes?

Authors: Olga Taran, Joakim Tutt, Taras Holotyak, Roman Chaban, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05

Dataset: Large-scale Urban IoT Activity Data for DDoS Attack Emulation

Authors: Arvin Hekmati, Eugenio Grippo, Bhaskar Krishnamachari | Published: 2021-10-05

An energy-based model for neuro-symbolic reasoning on knowledge graphs

Authors: Dominik Dold, Josep Soler Garrido | Published: 2021-10-04