Revisiting IoT Device Identification

Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi | Published: 2021-07-16

Towards Quantifying the Carbon Emissions of Differentially Private Machine Learning

Authors: Rakshit Naidu, Harshita Diddee, Ajinkya Mulay, Aleti Vardhan, Krithika Ramesh, Ahmed Zamzam | Published: 2021-07-14

On the impossibility of non-trivial accuracy under fairness constraints

Authors: Carlos Pinzón, Catuscia Palamidessi, Pablo Piantanida, Frank Valencia | Published: 2021-07-14 | Updated: 2021-11-23

Feature Shift Detection: Localizing Which Features Have Shifted via Conditional Distribution Tests

Authors: Sean Kulinski, Saurabh Bagchi, David I. Inouye | Published: 2021-07-14

OmniLytics: A Blockchain-based Secure Data Market for Decentralized Machine Learning

Authors: Jiacheng Liang, Songze Li, Bochuan Cao, Wensi Jiang, Chaoyang He | Published: 2021-07-12 | Updated: 2021-11-15

Deep Transfer Learning Based Intrusion Detection System for Electric Vehicular Networks

Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed | Published: 2021-07-12

Stateful Detection of Model Extraction Attacks

Authors: Soham Pal, Yash Gupta, Aditya Kanade, Shirish Shevade | Published: 2021-07-12

Attack Rules: An Adversarial Approach to Generate Attacks for Industrial Control Systems using Machine Learning

Authors: Muhammad Azmi Umer, Chuadhry Mujeeb Ahmed, Muhammad Taha Jilani, Aditya P. Mathur | Published: 2021-07-11

Adversarial for Good? How the Adversarial ML Community’s Values Impede Socially Beneficial Uses of Attacks

Authors: Kendra Albert, Maggie Delano, Bogdan Kulynych, Ram Shankar Siva Kumar | Published: 2021-07-11 | Updated: 2021-09-15

Hack The Box: Fooling Deep Learning Abstraction-Based Monitors

Authors: Sara Hajj Ibrahim, Mohamed Nassar | Published: 2021-07-10 | Updated: 2021-07-18