CURE: A Security Architecture with CUstomizable and Resilient Enclaves

Authors: Raad Bahmani, Ferdinand Brasser, Ghada Dessouky, Patrick Jauernig, Matthias Klimmek, Ahmad-Reza Sadeghi, Emmanuel Stapf | Published: 2020-10-29

Reliable Graph Neural Networks via Robust Aggregation

Authors: Simon Geisler, Daniel Zügner, Stephan Günnemann | Published: 2020-10-29

Evaluating Robustness of Predictive Uncertainty Estimation: Are Dirichlet-based Models Reliable?

Authors: Anna-Kathrin Kopetzki, Bertrand Charpentier, Daniel Zügner, Sandhya Giri, Stephan Günnemann | Published: 2020-10-28 | Updated: 2021-06-11

Generalized Insider Attack Detection Implementation using NetFlow Data

Authors: Yash Samtani, Jesse Elwell | Published: 2020-10-27

FaceLeaks: Inference Attacks against Transfer Learning Models via Black-box Queries

Authors: Seng Pei Liew, Tsubasa Takahashi | Published: 2020-10-27

Robust and Verifiable Information Embedding Attacks to Deep Neural Networks via Error-Correcting Codes

Authors: Jinyuan Jia, Binghui Wang, Neil Zhenqiang Gong | Published: 2020-10-26

Asymptotic Behavior of Adversarial Training in Binary Classification

Authors: Hossein Taheri, Ramtin Pedarsani, Christos Thrampoulidis | Published: 2020-10-26 | Updated: 2021-07-14

Performance Analysis of Scientific Computing Workloads on Trusted Execution Environments

Authors: Ayaz Akram, Anna Giannakou, Venkatesh Akella, Jason Lowe-Power, Sean Peisert | Published: 2020-10-25

ATRO: Adversarial Training with a Rejection Option

Authors: Masahiro Kato, Zhenghang Cui, Yoshihiro Fukuhara | Published: 2020-10-24

Graph Information Bottleneck

Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24