Against Membership Inference Attack: Pruning is All You Need

Authors: Yijue Wang, Chenghong Wang, Zigeng Wang, Shanglin Zhou, Hang Liu, Jinbo Bi, Caiwen Ding, Sanguthevar Rajasekaran | Published: 2020-08-28 | Updated: 2021-07-04

Every Query Counts: Analyzing the Privacy Loss of Exploratory Data Analyses

Authors: Saskia Nuñez von Voigt, Mira Pauli, Johanna Reichert, Florian Tschorsch | Published: 2020-08-27

Adversarial Eigen Attack on Black-Box Models

Authors: Linjun Zhou, Peng Cui, Yinan Jiang, Shiqiang Yang | Published: 2020-08-27

Adversarially Training for Audio Classifiers

Authors: Raymel Alfonso Sallo, Mohammad Esmaeilpour, Patrick Cardinal | Published: 2020-08-26 | Updated: 2020-10-25

Two Sides of the Same Coin: White-box and Black-box Attacks for Transfer Learning

Authors: Yinghua Zhang, Yangqiu Song, Jian Liang, Kun Bai, Qiang Yang | Published: 2020-08-25

Precision Health Data: Requirements, Challenges and Existing Techniques for Data Security and Privacy

Authors: Chandra Thapa, Seyit Camtepe | Published: 2020-08-24

Vulnerability of Face Recognition Systems Against Composite Face Reconstruction Attack

Authors: Hadi Mansourifar, Weidong Shi | Published: 2020-08-23

Multiple Classification with Split Learning

Authors: Jongwon Kim, Sungho Shin, Yeonguk Yu, Junseok Lee, Kyoobin Lee | Published: 2020-08-22 | Updated: 2020-09-11

On the Intrinsic Differential Privacy of Bagging

Authors: Hongbin Liu, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2020-08-22

Near Optimal Adversarial Attacks on Stochastic Bandits and Defenses with Smoothed Responses

Authors: Shiliang Zuo | Published: 2020-08-21 | Updated: 2024-03-14