Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications

Authors: Aryan Verma | Published: 2021-09-06

Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning

Authors: Yusen Wu, Hao Chen, Xin Wang, Chao Liu, Phuong Nguyen, Yelena Yesha | Published: 2021-09-05

Predicting Process Name from Network Data

Authors: Justin Allen, David Knapp, Kristine Monteith | Published: 2021-09-03

CrypTen: Secure Multi-Party Computation Meets Machine Learning

Authors: Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, Laurens van der Maaten | Published: 2021-09-02 | Updated: 2022-09-15

Excess Capacity and Backdoor Poisoning

Authors: Naren Sarayu Manoj, Avrim Blum | Published: 2021-09-02 | Updated: 2021-11-03

Trade or Trick? Detecting and Characterizing Scam Tokens on Uniswap Decentralized Exchange

Authors: Pengcheng Xia, Haoyu wang, Bingyu Gao, Weihang Su, Zhou Yu, Xiapu Luo, Chao Zhang, Xusheng Xiao, Guoai Xu | Published: 2021-09-01 | Updated: 2021-11-11

Guarding Machine Learning Hardware Against Physical Side-Channel Attacks

Authors: Anuj Dubey, Rosario Cammarota, Vikram Suresh, Aydin Aysu | Published: 2021-09-01

EG-Booster: Explanation-Guided Booster of ML Evasion Attacks

Authors: Abderrahmen Amich, Birhanu Eshete | Published: 2021-08-31 | Updated: 2021-09-02

Private Multi-Task Learning: Formulation and Applications to Federated Learning

Authors: Shengyuan Hu, Zhiwei Steven Wu, Virginia Smith | Published: 2021-08-30 | Updated: 2023-10-17

Student Surpasses Teacher: Imitation Attack for Black-Box NLP APIs

Authors: Qiongkai Xu, Xuanli He, Lingjuan Lyu, Lizhen Qu, Gholamreza Haffari | Published: 2021-08-29 | Updated: 2022-09-04