Security and Privacy Considerations for Machine Learning Models Deployed in the Government and Public Sector (white paper)

Authors: Nader Sehatbakhsh, Ellie Daw, Onur Savas, Amin Hassanzadeh, Ian McCulloh | Published: 2020-10-12

ByzShield: An Efficient and Robust System for Distributed Training

Authors: Konstantinos Konstantinidis, Aditya Ramamoorthy | Published: 2020-10-10 | Updated: 2021-03-04

How Does Mixup Help With Robustness and Generalization?

Authors: Linjun Zhang, Zhun Deng, Kenji Kawaguchi, Amirata Ghorbani, James Zou | Published: 2020-10-09 | Updated: 2021-03-17

Anomaly detection with superexperts under delayed feedback

Authors: Raisa Dzhamtyrova, Carsten Maple | Published: 2020-10-08 | Updated: 2021-04-22

Transcending Transcend: Revisiting Malware Classification in the Presence of Concept Drift

Authors: Federico Barbero, Feargus Pendlebury, Fabio Pierazzi, Lorenzo Cavallaro | Published: 2020-10-08 | Updated: 2024-01-08

Adversarial Attacks to Machine Learning-Based Smart Healthcare Systems

Authors: AKM Iqtidar Newaz, Nur Imtiazul Haque, Amit Kumar Sikder, Mohammad Ashiqur Rahman, A. Selcuk Uluagac | Published: 2020-10-07

Uncovering the Limits of Adversarial Training against Norm-Bounded Adversarial Examples

Authors: Sven Gowal, Chongli Qin, Jonathan Uesato, Timothy Mann, Pushmeet Kohli | Published: 2020-10-07 | Updated: 2021-03-30

CATBERT: Context-Aware Tiny BERT for Detecting Social Engineering Emails

Authors: Younghoo Lee, Joshua Saxe, Richard Harang | Published: 2020-10-07

Not All Datasets Are Born Equal: On Heterogeneous Data and Adversarial Examples

Authors: Yael Mathov, Eden Levy, Ziv Katzir, Asaf Shabtai, Yuval Elovici | Published: 2020-10-07 | Updated: 2021-09-02

Correlated Differential Privacy: Feature Selection in Machine Learning

Authors: Tao Zhang, Tianqing Zhu, Ping Xiong, Huan Huo, Zahir Tari, Wanlei Zhou | Published: 2020-10-07