Efficient Encrypted Inference on Ensembles of Decision Trees

Authors: Kanthi Sarpatwar, Karthik Nandakumar, Nalini Ratha, James Rayfield, Karthikeyan Shanmugam, Sharath Pankanti, Roman Vaculin | Published: 2021-03-05

Quantifying identifiability to choose and audit $ε$ in differentially private deep learning

Authors: Daniel Bernau, Günther Eibl, Philip W. Grassal, Hannah Keller, Florian Kerschbaum | Published: 2021-03-04 | Updated: 2021-07-20

Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things

Authors: Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal | Published: 2021-03-03

A Modified Drake Equation for Assessing Adversarial Risk to Machine Learning Models

Authors: Josh Kalin, David Noever, Matthew Ciolino | Published: 2021-03-03 | Updated: 2021-07-07

Malware Classification with Word Embedding Features

Authors: Aparna Sunil Kale, Fabio Di Troia, Mark Stamp | Published: 2021-03-03

Graph Computing for Financial Crime and Fraud Detection: Trends, Challenges and Outlook

Authors: E. Kurshan, H. Shen | Published: 2021-03-02

Private Stochastic Convex Optimization: Optimal Rates in $\ell_1$ Geometry

Authors: Hilal Asi, Vitaly Feldman, Tomer Koren, Kunal Talwar | Published: 2021-03-02

Smoothness Analysis of Adversarial Training

Authors: Sekitoshi Kanai, Masanori Yamada, Hiroshi Takahashi, Yuki Yamanaka, Yasutoshi Ida | Published: 2021-03-02 | Updated: 2023-03-06

Adversarial Information Bottleneck

Authors: Penglong Zhai, Shihua Zhang | Published: 2021-02-28 | Updated: 2021-03-03

Deepfakes Generation and Detection: State-of-the-art, open challenges, countermeasures, and way forward

Authors: Momina Masood, Marriam Nawaz, Khalid Mahmood Malik, Ali Javed, Aun Irtaza | Published: 2021-02-25 | Updated: 2021-11-23