Computer Systems Have 99 Problems, Let’s Not Make Machine Learning Another One

Authors: David Mohaisen, Songqing Chen | Published: 2019-11-28

Free-riders in Federated Learning: Attacks and Defenses

Authors: Jierui Lin, Min Du, Jian Liu | Published: 2019-11-28

Android Botnet Detection using Convolutional Neural Networks

Authors: Sina Hojjatinia, Sajad Hamzenejadi, Hadis Mohseni | Published: 2019-11-27

Survey of Attacks and Defenses on Edge-Deployed Neural Networks

Authors: Mihailo Isakov, Vijay Gadepally, Karen M. Gettings, Michel A. Kinsy | Published: 2019-11-27

An Adaptive View of Adversarial Robustness from Test-time Smoothing Defense

Authors: Chao Tang, Yifei Fan, Anthony Yezzi | Published: 2019-11-26

Local Model Poisoning Attacks to Byzantine-Robust Federated Learning

Authors: Minghong Fang, Xiaoyu Cao, Jinyuan Jia, Neil Zhenqiang Gong | Published: 2019-11-26 | Updated: 2021-11-21

Defending Against Adversarial Machine Learning

Authors: Alison Jenkins | Published: 2019-11-26

Assessing Supply Chain Cyber Risks

Authors: Alberto Redondo, Alberto Torres-Barrán, David Ríos Insua, Jordi Domingo | Published: 2019-11-26

Network Intrusion Detection based on LSTM and Feature Embedding

Authors: Hyeokmin Gwon, Chungjun Lee, Rakun Keum, Heeyoul Choi | Published: 2019-11-26

Privacy preserving Neural Network Inference on Encrypted Data with GPUs

Authors: Daniel Takabi, Robert Podschwadt, Jeff Druce, Curt Wu, Kevin Procopio | Published: 2019-11-26