Modelling and Quantifying Membership Information Leakage in Machine Learning

Authors: Farhad Farokhi, Mohamed Ali Kaafar | Published: 2020-01-29 | Updated: 2020-04-28

IoT Behavioral Monitoring via Network Traffic Analysis

Authors: Arunan Sivanathan | Published: 2020-01-28

Privacy-Preserving Gaussian Process Regression — A Modular Approach to the Application of Homomorphic Encryption

Authors: Peter Fenner, Edward O. Pyzer-Knapp | Published: 2020-01-28

Interpreting Machine Learning Malware Detectors Which Leverage N-gram Analysis

Authors: William Briguglio, Sherif Saad | Published: 2020-01-27

Challenges and Countermeasures for Adversarial Attacks on Deep Reinforcement Learning

Authors: Inaam Ilahi, Muhammad Usama, Junaid Qadir, Muhammad Umar Janjua, Ala Al-Fuqaha, Dinh Thai Hoang, Dusit Niyato | Published: 2020-01-27 | Updated: 2021-09-08

Practical Fast Gradient Sign Attack against Mammographic Image Classifier

Authors: Ibrahim Yilmaz | Published: 2020-01-27

Generating Natural Adversarial Hyperspectral examples with a modified Wasserstein GAN

Authors: Jean-Christophe Burnel, Kilian Fatras, Nicolas Courty | Published: 2020-01-27

Ensemble Noise Simulation to Handle Uncertainty about Gradient-based Adversarial Attacks

Authors: Rehana Mahfuz, Rajeev Sahay, Aly El Gamal | Published: 2020-01-26

Secondary Use of Electronic Health Record: Opportunities and Challenges

Authors: Shahid Munir Shah, Rizwan Ahmed Khan | Published: 2020-01-26

Privacy for All: Demystify Vulnerability Disparity of Differential Privacy against Membership Inference Attack

Authors: Bo Zhang, Ruotong Yu, Haipei Sun, Yanying Li, Jun Xu, Hui Wang | Published: 2020-01-24