Differential 3D Facial Recognition: Adding 3D to Your State-of-the-Art 2D Method

Authors: J. Matias Di Martino, Fernando Suzacq, Mauricio Delbracio, Qiang Qiu, Guillermo Sapiro | Published: 2020-04-03

An Overview of Federated Deep Learning Privacy Attacks and Defensive Strategies

Authors: David Enthoven, Zaid Al-Ars | Published: 2020-04-01

Botnet Detection Using Recurrent Variational Autoencoder

Authors: Jeeyung Kim, Alex Sim, Jinoh Kim, Kesheng Wu | Published: 2020-04-01

MetaPoison: Practical General-purpose Clean-label Data Poisoning

Authors: W. Ronny Huang, Jonas Geiping, Liam Fowl, Gavin Taylor, Tom Goldstein | Published: 2020-04-01 | Updated: 2021-02-21

Information Leakage in Embedding Models

Authors: Congzheng Song, Ananth Raghunathan | Published: 2020-03-31 | Updated: 2020-08-19

Differentially Private Naive Bayes Classifier using Smooth Sensitivity

Authors: Farzad Zafarani, Chris Clifton | Published: 2020-03-31 | Updated: 2021-07-19

Policy Teaching via Environment Poisoning: Training-time Adversarial Attacks against Reinforcement Learning

Authors: Amin Rakhsha, Goran Radanovic, Rati Devidze, Xiaojin Zhu, Adish Singla | Published: 2020-03-28 | Updated: 2020-08-19

Adaptive Reward-Poisoning Attacks against Reinforcement Learning

Authors: Xuezhou Zhang, Yuzhe Ma, Adish Singla, Xiaojin Zhu | Published: 2020-03-27 | Updated: 2020-06-22

A Separation Result Between Data-oblivious and Data-aware Poisoning Attacks

Authors: Samuel Deng, Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Abhradeep Thakurta | Published: 2020-03-26 | Updated: 2021-12-13

Adversarial Perturbations Fool Deepfake Detectors

Authors: Apurva Gandhi, Shomik Jain | Published: 2020-03-24 | Updated: 2020-05-15