Information-Theoretic Bounds on the Generalization Error and Privacy Leakage in Federated Learning

Authors: Semih Yagli, Alex Dytso, H. Vincent Poor | Published: 2020-05-05

Adversarial Training against Location-Optimized Adversarial Patches

Authors: Sukrut Rao, David Stutz, Bernt Schiele | Published: 2020-05-05 | Updated: 2020-12-14

When Machine Unlearning Jeopardizes Privacy

Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2020-05-05 | Updated: 2021-09-14

Stealing Links from Graph Neural Networks

Authors: Xinlei He, Jinyuan Jia, Michael Backes, Neil Zhenqiang Gong, Yang Zhang | Published: 2020-05-05 | Updated: 2020-10-05

Mind the Gap: On Bridging the Semantic Gap between Machine Learning and Information Security

Authors: Michael R. Smith, Nicholas T. Johnson, Joe B. Ingram, Armida J. Carbajal, Ramyaa Ramyaa, Evelyn Domschot, Christopher C. Lamb, Stephen J. Verzi, W. Philip Kegelmeyer | Published: 2020-05-04

Depth-2 Neural Networks Under a Data-Poisoning Attack

Authors: Sayar Karmakar, Anirbit Mukherjee, Theodore Papamarkou | Published: 2020-05-04 | Updated: 2022-06-29

Do Gradient-based Explanations Tell Anything About Adversarial Robustness to Android Malware?

Authors: Marco Melis, Michele Scalas, Ambra Demontis, Davide Maiorca, Battista Biggio, Giorgio Giacinto, Fabio Roli | Published: 2020-05-04 | Updated: 2021-05-27

Differentially Private Collaborative Intrusion Detection Systems For VANETs

Authors: Tao Zhang, Quanyan Zhu | Published: 2020-05-02

Robust Deep Learning as Optimal Control: Insights and Convergence Guarantees

Authors: Jacob H. Seidman, Mahyar Fazlyab, Victor M. Preciado, George J. Pappas | Published: 2020-05-01

Studying Ransomware Attacks Using Web Search Logs

Authors: Chetan Bansal, Pantazis Deligiannis, Chandra Maddila, Nikitha Rao | Published: 2020-05-01 | Updated: 2020-05-23