Image Obfuscation for Privacy-Preserving Machine Learning

Authors: Mathilde Raynal, Radhakrishna Achanta, Mathias Humbert | Published: 2020-10-20

A Survey of Machine Learning Techniques in Adversarial Image Forensics

Authors: Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo | Published: 2020-10-19

Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification

Authors: Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad Rieck | Published: 2020-10-19

Dos and Don’ts of Machine Learning in Computer Security

Authors: Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck | Published: 2020-10-19 | Updated: 2021-11-30

Privacy-preserving Data Sharing on Vertically Partitioned Data

Authors: Razane Tajeddine, Joonas Jälkö, Samuel Kaski, Antti Honkela | Published: 2020-10-19 | Updated: 2022-09-02

Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders

Authors: Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici | Published: 2020-10-19 | Updated: 2021-09-02

Enabling Fast Differentially Private SGD via Just-in-Time Compilation and Vectorization

Authors: Pranav Subramani, Nicholas Vadivelu, Gautam Kamath | Published: 2020-10-18 | Updated: 2021-10-26

GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment

Authors: Aref Asvadishirehjini, Murat Kantarcioglu, Bradley Malin | Published: 2020-10-17

Secure Weighted Aggregation for Federated Learning

Authors: Jiale Guo, Ziyao Liu, Kwok-Yan Lam, Jun Zhao, Yiqiang Chen, Chaoping Xing | Published: 2020-10-17 | Updated: 2021-05-11

Position paper: A systematic framework for categorising IoT device fingerprinting mechanisms

Authors: Poonam Yadav, Angelo Feraudo, Budi Arief, Siamak F. Shahandashti, Vassilios G. Vassilakis | Published: 2020-10-16 | Updated: 2020-10-19