Efficient and Transferable Adversarial Examples from Bayesian Neural Networks

Authors: Martin Gubri, Maxime Cordy, Mike Papadakis, Yves Le Traon, Koushik Sen | Published: 2020-11-10 | Updated: 2022-06-18

The Cost of Privacy in Generalized Linear Models: Algorithms and Minimax Lower Bounds

Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2020-11-08 | Updated: 2020-12-06

On the Privacy Risks of Algorithmic Fairness

Authors: Hongyan Chang, Reza Shokri | Published: 2020-11-07 | Updated: 2021-04-07

Blockchain based Attack Detection on Machine Learning Algorithms for IoT based E-Health Applications

Authors: Thippa Reddy Gadekallu, Manoj M K, Sivarama Krishnan S, Neeraj Kumar, Saqib Hakak, Sweta Bhattacharya | Published: 2020-11-03 | Updated: 2021-10-02

Adversarial Examples in Constrained Domains

Authors: Ryan Sheatsley, Nicolas Papernot, Michael Weisman, Gunjan Verma, Patrick McDaniel | Published: 2020-11-02 | Updated: 2022-09-09

End-to-end anti-spoofing with RawNet2

Authors: Hemlata Tak, Jose Patino, Massimiliano Todisco, Andreas Nautsch, Nicholas Evans, Anthony Larcher | Published: 2020-11-02 | Updated: 2021-12-16

On No-Sensing Adversarial Multi-player Multi-armed Bandits with Collision Communications

Authors: Chengshuai Shi, Cong Shen | Published: 2020-11-02 | Updated: 2021-04-24

Differentially Private ADMM Algorithms for Machine Learning

Authors: Tao Xu, Fanhua Shang, Yuanyuan Liu, Hongying Liu, Longjie Shen, Maoguo Gong | Published: 2020-10-31

Being Single Has Benefits. Instance Poisoning to Deceive Malware Classifiers

Authors: Tzvika Shapira, David Berend, Ishai Rosenberg, Yang Liu, Asaf Shabtai, Yuval Elovici | Published: 2020-10-30

Differential Privacy and Natural Language Processing to Generate Contextually Similar Decoy Messages in Honey Encryption Scheme

Authors: Kunjal Panchal | Published: 2020-10-29