Zeroth-Order Hybrid Gradient Descent: Towards A Principled Black-Box Optimization Framework

Authors: Pranay Sharma, Kaidi Xu, Sijia Liu, Pin-Yu Chen, Xue Lin, Pramod K. Varshney | Published: 2020-12-21

Variational Quantum Cloning: Improving Practicality for Quantum Cryptanalysis

Authors: Brian Coyle, Mina Doosti, Elham Kashefi, Niraj Kumar | Published: 2020-12-21

FedServing: A Federated Prediction Serving Framework Based on Incentive Mechanism

Authors: Jiasi Weng, Jian Weng, Hongwei Huang, Chengjun Cai, Cong Wang | Published: 2020-12-19

NN-EMD: Efficiently Training Neural Networks using Encrypted Multi-Sourced Datasets

Authors: Runhua Xu, James Joshi, Chao Li | Published: 2020-12-18 | Updated: 2021-04-18

Dataset Security for Machine Learning: Data Poisoning, Backdoor Attacks, and Defenses

Authors: Micah Goldblum, Dimitris Tsipras, Chulin Xie, Xinyun Chen, Avi Schwarzschild, Dawn Song, Aleksander Madry, Bo Li, Tom Goldstein | Published: 2020-12-18 | Updated: 2021-03-31

Identification of Metallic Objects using Spectral MPT Signatures: Object Characterisation and Invariants

Authors: P. D. Ledger, B. A. Wilson, A. A. S. Amad, W. R. B. Lionheart | Published: 2020-12-18

Learning from History for Byzantine Robust Optimization

Authors: Sai Praneeth Karimireddy, Lie He, Martin Jaggi | Published: 2020-12-18 | Updated: 2021-06-29

Intrusion Detection and identification System Design and Performance Evaluation for Industrial SCADA Networks

Authors: Ahsan Al Zaki Khan, Gursel Serpen | Published: 2020-12-17

Machine Learning for Detecting Data Exfiltration: A Review

Authors: Bushra Sabir, Faheem Ullah, M. Ali Babar, Raj Gaire | Published: 2020-12-17 | Updated: 2021-03-21

Detecting Botnet Attacks in IoT Environments: An Optimized Machine Learning Approach

Authors: MohammadNoor Injadat, Abdallah Moubayed, Abdallah Shami | Published: 2020-12-16