Privacy-Preserving Gradient Boosting Decision Trees

Authors: Qinbin Li, Zhaomin Wu, Zeyi Wen, Bingsheng He | Published: 2019-11-11 | Updated: 2022-10-10

Collaborative Homomorphic Computation on Data Encrypted under Multiple Keys

Authors: Asma Aloufi, Peizhao Hu | Published: 2019-11-11

Minimalistic Attacks: How Little it Takes to Fool a Deep Reinforcement Learning Policy

Authors: Xinghua Qu, Zhu Sun, Yew-Soon Ong, Abhishek Gupta, Pengfei Wei | Published: 2019-11-10 | Updated: 2020-10-29

Preservation of Anomalous Subgroups On Machine Learning Transformed Data

Authors: Samuel C. Maina, Reginald E. Bryant, William O. Goal, Robert-Florian Samoilescu, Kush R. Varshney, Komminist Weldemariam | Published: 2019-11-09

Analyzing Bias in Sensitive Personal Information Used to Train Financial Models

Authors: Reginald Bryant, Celia Cintas, Isaac Wambugu, Andrew Kinai, Komminist Weldemariam | Published: 2019-11-09

AutoIDS: Auto-encoder Based Method for Intrusion Detection System

Authors: Mohammed Gharib, Bahram Mohammadi, Shadi Hejareh Dastgerdi, Mohammad Sabokrou | Published: 2019-11-08

Imperceptible Adversarial Attacks on Tabular Data

Authors: Vincent Ballet, Xavier Renard, Jonathan Aigrain, Thibault Laugel, Pascal Frossard, Marcin Detyniecki | Published: 2019-11-08 | Updated: 2019-12-13

Revocable Federated Learning: A Benchmark of Federated Forest

Authors: Yang Liu, Zhuo Ma, Ximeng Liu, Zhuzhu Wang, Siqi Ma, Ken Ren | Published: 2019-11-08

Patch augmentation: Towards efficient decision boundaries for neural networks

Authors: Marcus D. Bloice, Peter M. Roth, Andreas Holzinger | Published: 2019-11-08 | Updated: 2019-11-25

Certified Data Removal from Machine Learning Models

Authors: Chuan Guo, Tom Goldstein, Awni Hannun, Laurens van der Maaten | Published: 2019-11-08 | Updated: 2023-11-08