Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack

Authors: Hadi Mansourifar, Weidong Shi | Published: 2020-08-23

Multiple Classification with Split Learning

Authors: Jongwon Kim, Sungho Shin, Yeonguk Yu, Junseok Lee, Kyoobin Lee | Published: 2020-08-22 | Updated: 2020-09-11

On the Intrinsic Differential Privacy of Bagging

Authors: Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2020-08-22

Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses

Authors: Shiliang Zuo | Published: 2020-08-21 | Updated: 2024-03-14

Defending Distributed Classifiers Against Data Poisoning Attacks

Authors: Sandamal Weerasinghe, Tansu Alpcan, Sarah M. Erfani, Christopher Leckie | Published: 2020-08-21

Defending Regression Learners Against Poisoning Attacks

Authors: Sandamal Weerasinghe, Sarah M. Erfani, Tansu Alpcan, Christopher Leckie, Justin Kopacz | Published: 2020-08-21

A(DP)$^2$SGD: Asynchronous Decentralized Parallel Stochastic Gradient Descent with Differential Privacy

Authors: Jie Xu, Wei Zhang, Fei Wang | Published: 2020-08-21

PicoDomain: A Compact High-Fidelity Cybersecurity Dataset

Authors: Craig Laprade, Benjamin Bowman, H. Howie Huang | Published: 2020-08-20

NoPeek: Information leakage reduction to share activations in distributed deep learning

Authors: Praneeth Vepakomma, Abhishek Singh, Otkrist Gupta, Ramesh Raskar | Published: 2020-08-20

Towards adversarial robustness with 01 loss neural networks

Authors: Yunzhe Xue, Meiyan Xie, Usman Roshan | Published: 2020-08-20