On Primes, Log-Loss Scores and (No) Privacy

Authors: Abhinav Aggarwal, Zekun Xu, Oluwaseyi Feyisetan, Nathanael Teissier | Published: 2020-09-17

Real-Time Anomaly Detection in Edge Streams

Authors: Siddharth Bhatia, Rui Liu, Bryan Hooi, Minji Yoon, Kijung Shin, Christos Faloutsos | Published: 2020-09-17 | Updated: 2022-04-25

Byzantine-Robust Variance-Reduced Federated Learning over Distributed Non-i.i.d. Data

Authors: Jie Peng, Zhaoxian Wu, Qing Ling, Tianyi Chen | Published: 2020-09-17 | Updated: 2021-08-28

Finding Effective Security Strategies through Reinforcement Learning and Self-Play

Authors: Kim Hammar, Rolf Stadler | Published: 2020-09-17 | Updated: 2020-10-04

An Extension of Fano’s Inequality for Characterizing Model Susceptibility to Membership Inference Attacks

Authors: Sumit Kumar Jha, Susmit Jha, Rickard Ewetz, Sunny Raj, Alvaro Velasquez, Laura L. Pullum, Ananthram Swami | Published: 2020-09-17

FLAME: Differentially Private Federated Learning in the Shuffle Model

Authors: Ruixuan Liu, Yang Cao, Hong Chen, Ruoyang Guo, Masatoshi Yoshikawa | Published: 2020-09-17 | Updated: 2021-03-20

Distilled One-Shot Federated Learning

Authors: Yanlin Zhou, George Pu, Xiyao Ma, Xiaolin Li, Dapeng Wu | Published: 2020-09-17 | Updated: 2021-06-06

Multimodal Safety-Critical Scenarios Generation for Decision-Making Algorithms Evaluation

Authors: Wenhao Ding, Baiming Chen, Bo Li, Kim Ji Eun, Ding Zhao | Published: 2020-09-16 | Updated: 2020-12-26

Hardware-Assisted Detection of Firmware Attacks in Inverter-Based Cyberphysical Microgrids

Authors: Abraham Peedikayil Kuruvila, Ioannis Zografopoulos, Kanad Basu, Charalambos Konstantinou | Published: 2020-09-16 | Updated: 2021-04-18

The Dark (and Bright) Side of IoT: Attacks and Countermeasures for Identifying Smart Home Devices and Services

Authors: Ahmed Mohamed Hussain, Gabriele Oligeri, Thiemo Voigt | Published: 2020-09-16 | Updated: 2021-07-25