A Decentralized Federated Learning Framework via Committee Mechanism with Convergence Guarantee

Authors: Chunjiang Che, Xiaoli Li, Chuan Chen, Xiaoyu He, Zibin Zheng | Published: 2021-08-01 | Updated: 2022-09-08

Private Retrieval, Computing and Learning: Recent Progress and Future Challenges

Authors: Sennur Ulukus, Salman Avestimehr, Michael Gastpar, Syed Jafar, Ravi Tandon, Chao Tian | Published: 2021-07-30

Synthetic flow-based cryptomining attack generation through Generative Adversarial Networks

Authors: Alberto Mozo, Ángel González-Prieto, Antonio Pastor, Sandra Gómez-Canaval, Edgar Talavera | Published: 2021-07-30

Unveiling the potential of Graph Neural Networks for robust Intrusion Detection

Authors: David Pujol-Perich, José Suárez-Varela, Albert Cabellos-Aparicio, Pere Barlet-Ros | Published: 2021-07-30

Who’s Afraid of Thomas Bayes?

Authors: Erick Galinkin | Published: 2021-07-30

Can You Hear It? Backdoor Attacks via Ultrasonic Triggers

Authors: Stefanos Koffas, Jing Xu, Mauro Conti, Stjepan Picek | Published: 2021-07-30 | Updated: 2022-03-06

Blind Faith: Privacy-Preserving Machine Learning using Function Approximation

Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29

PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase

Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29

Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications

Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15

PDF-Malware: An Overview on Threats, Detection and Evasion Attacks

Authors: Nicolas Fleury, Theo Dubrunquez, Ihsen Alouani | Published: 2021-07-27