Privacy-Preserving Machine Learning: Methods, Challenges and Directions

Authors: Runhua Xu, Nathalie Baracaldo, James Joshi | Published: 2021-08-10 | Updated: 2021-09-22

Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption

Authors: Dimitris Stripelis, Hamza Saleem, Tanmay Ghai, Nikhil Dhinagar, Umang Gupta, Chrysovalantis Anastasiou, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, Jose Luis Ambite | Published: 2021-08-07 | Updated: 2021-11-09

Adversarial Attacks Against Deep Reinforcement Learning Framework in Internet of Vehicles

Authors: Anum Talpur, Mohan Gurusamy | Published: 2021-08-02 | Updated: 2021-09-16

Derivative-free Alternating Projection Algorithms for General Nonconvex-Concave Minimax Problems

Authors: Zi Xu, Ziqi Wang, Jingjing Shen, Yuhong Dai | Published: 2021-08-01 | Updated: 2024-01-25

Advances in adversarial attacks and defenses in computer vision: A survey

Authors: Naveed Akhtar, Ajmal Mian, Navid Kardan, Mubarak Shah | Published: 2021-08-01 | Updated: 2021-09-02

A Decentralized Federated Learning Framework via Committee Mechanism with Convergence Guarantee

Authors: Chunjiang Che, Xiaoli Li, Chuan Chen, Xiaoyu He, Zibin Zheng | Published: 2021-08-01 | Updated: 2022-09-08

Private Retrieval, Computing and Learning: Recent Progress and Future Challenges

Authors: Sennur Ulukus, Salman Avestimehr, Michael Gastpar, Syed Jafar, Ravi Tandon, Chao Tian | Published: 2021-07-30

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

Authors: Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera | Published: 2021-07-30

Unveiling the potential of Graph Neural Networks for robust Intrusion Detection

Authors: David Pujol-Perich, José Suárez-Varela, Albert Cabellos-Aparicio, Pere Barlet-Ros | Published: 2021-07-30

Who’s Afraid of Thomas Bayes?

Authors: Erick Galinkin | Published: 2021-07-30