Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes

Authors: Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-10-26

Asymptotic Behavior of Adversarial Training in Binary Classification

Authors: Hossein Taheri, Ramtin Pedarsani, Christos Thrampoulidis | Published: 2020-10-26 | Updated: 2021-07-14

Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments

Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert | Published: 2020-10-25

ATRO: Adversarial Training with a Rejection Option

Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24

Graph Information Bottleneck

Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24

Model Extraction Attacks on Graph Neural Networks: Taxonomy and Realization

Authors: Bang Wu, Xiangwen Yang, Shirui Pan, Xingliang Yuan | Published: 2020-10-24 | Updated: 2021-11-30

Avoiding Occupancy Detection from Smart Meter using Adversarial Machine Learning

Authors: ibrahim Yilmaz, Ambareen Siraj | Published: 2020-10-23

DualNet: Locate Then Detect Effective Payload with Deep Attention Network

Authors: Shiyi Yang, Peilun Wu, Hui Guo | Published: 2020-10-23

Investigating Membership Inference Attacks under Data Dependencies

Authors: Thomas Humphries, Simon Oya, Lindsey Tulloch, Matthew Rafuse, Ian Goldberg, Urs Hengartner, Florian Kerschbaum | Published: 2020-10-23 | Updated: 2023-06-14

A Differentially Private Text Perturbation Method Using a Regularized Mahalanobis Metric

Authors: Zekun Xu, Abhinav Aggarwal, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-10-22