Plinius: Secure and Persistent Machine Learning Model Training

Authors: Peterson Yuhala, Pascal Felber, Valerio Schiavoni, Alain Tchana | Published: 2021-04-07 | Updated: 2021-04-08

Robust Classification Under $\ell_0$ Attack for the Gaussian Mixture Model

Authors: Payam Delgosha, Hamed Hassani, Ramtin Pedarsani | Published: 2021-04-05

Jekyll: Attacking Medical Image Diagnostics using Deep Generative Models

Authors: Neal Mangaokar, Jiameng Pu, Parantapa Bhattacharya, Chandan K. Reddy, Bimal Viswanath | Published: 2021-04-05

Monte Carlo execution time estimation for Privacy-preserving Distributed Function Evaluation protocols

Authors: Stefano M P C Souza, Daniel G Silva | Published: 2021-04-03

A Systematic Literature Review on Phishing and Anti-Phishing Techniques

Authors: Ayesha Arshad, Attique Ur Rehman, Sabeen Javaid, Tahir Muhammad Ali, Javed Anjum Sheikh, Muhammad Azeem | Published: 2021-04-02

SGBA: A Stealthy Scapegoat Backdoor Attack against Deep Neural Networks

Authors: Ying He, Zhili Shen, Chang Xia, Jingyu Hua, Wei Tong, Sheng Zhong | Published: 2021-04-02 | Updated: 2022-05-16

Adversarial Attacks and Defenses for Speech Recognition Systems

Authors: Piotr Żelasko, Sonal Joshi, Yiwen Shao, Jesus Villalba, Jan Trmal, Najim Dehak, Sanjeev Khudanpur | Published: 2021-03-31

Anomaly-Based Intrusion Detection by Machine Learning: A Case Study on Probing Attacks to an Institutional Network

Authors: Emrah Tufan, Cihangir Tezcan, Cengiz Acartürk | Published: 2021-03-31

Perun: Secure Multi-Stakeholder Machine Learning Framework with GPU Support

Authors: Wojciech Ozga, Do Le Quoc, Christof Fetzer | Published: 2021-03-31

Statistical inference for individual fairness

Authors: Subha Maity, Songkai Xue, Mikhail Yurochkin, Yuekai Sun | Published: 2021-03-30