I-GCN: Robust Graph Convolutional Network via Influence Mechanism

Authors: Haoxi Zhan, Xiaobing Pei | Published: 2020-12-11

GNNUnlock: Graph Neural Networks-based Oracle-less Unlocking Scheme for Provably Secure Logic Locking

Authors: Lilas Alrahis, Satwik Patnaik, Faiq Khalid, Muhammad Abdullah Hanif, Hani Saleh, Muhammad Shafique, Ozgur Sinanoglu | Published: 2020-12-10

Privacy-preserving medical image analysis

Authors: Alexander Ziller, Jonathan Passerat-Palmbach, Théo Ryffel, Dmitrii Usynin, Andrew Trask, Ionésio Da Lima Costa Junior, Jason Mancuso, Marcus Makowski, Daniel Rueckert, Rickmer Braren, Georgios Kaissis | Published: 2020-12-10

Composite Adversarial Attacks

Authors: Xiaofeng Mao, Yuefeng Chen, Shuhui Wang, Hang Su, Yuan He, Hui Xue | Published: 2020-12-10

Research Challenges in Designing Differentially Private Text Generation Mechanisms

Authors: Oluwaseyi Feyisetan, Abhinav Aggarwal, Zekun Xu, Nathanael Teissier | Published: 2020-12-10

Risk Management Framework for Machine Learning Security

Authors: Jakub Breier, Adrian Baldwin, Helen Balinsky, Yang Liu | Published: 2020-12-09

An Isolation Forest Learning Based Outlier Detection Approach for Effectively Classifying Cyber Anomalies

Authors: Rony Chowdhury Ripan, Iqbal H. Sarker, Md Musfique Anwar, Md. Hasan Furhad, Fazle Rahat, Mohammed Moshiul Hoque, Muhammad Sarfraz | Published: 2020-12-09

Constant-round Blind Classical Verification of Quantum Sampling

Authors: Kai-Min Chung, Yi Lee, Han-Hsuan Lin, Xiaodi Wu | Published: 2020-12-09 | Updated: 2021-10-25

Ditto: Fair and Robust Federated Learning Through Personalization

Authors: Tian Li, Shengyuan Hu, Ahmad Beirami, Virginia Smith | Published: 2020-12-08 | Updated: 2021-06-15

Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks

Authors: Jinyuan Jia, Yupei Liu, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-12-07 | Updated: 2021-12-02