Who’s Afraid of Adversarial Transferability?

Authors: Ziv Katzir, Yuval Elovici | Published: 2021-05-02 | Updated: 2022-10-06

AirMixML: Over-the-Air Data Mixup for Inherently Privacy-Preserving Edge Machine Learning

Authors: Yusuke Koda, Jihong Park, Mehdi Bennis, Praneeth Vepakomma, Ramesh Raskar | Published: 2021-05-02

Privacy and Integrity Preserving Training Using Trusted Hardware

Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2021-05-01

Adversarial Example Detection for DNN Models: A Review and Experimental Comparison

Authors: Ahmed Aldahdooh, Wassim Hamidouche, Sid Ahmed Fezza, Olivier Deforges | Published: 2021-05-01 | Updated: 2022-01-07

Stealthy Backdoors as Compression Artifacts

Authors: Yulong Tian, Fnu Suya, Fengyuan Xu, David Evans | Published: 2021-04-30

Improved Matrix Gaussian Mechanism for Differential Privacy

Authors: Jungang Yang, Liyao Xiang, Weiting Li, Wei Liu, Xinbing Wang | Published: 2021-04-30

Extending Isolation Forest for Anomaly Detection in Big Data via K-Means

Authors: Md Tahmid Rahman Laskar, Jimmy Huang, Vladan Smetana, Chris Stewart, Kees Pouw, Aijun An, Stephen Chan, Lei Liu | Published: 2021-04-27

Metamorphic Detection of Repackaged Malware

Authors: Shirish Singh, Gail Kaiser | Published: 2021-04-27

Property Inference Attacks on Convolutional Neural Networks: Influence and Implications of Target Model’s Complexity

Authors: Mathias P. M. Parisot, Balazs Pejo, Dayana Spagnuelo | Published: 2021-04-27

Exploiting Explanations for Model Inversion Attacks

Authors: Xuejun Zhao, Wencan Zhang, Xiaokui Xiao, Brian Y. Lim | Published: 2021-04-26 | Updated: 2022-03-14