Eavesdrop the Composition Proportion of Training Labels in Federated Learning

Authors: Lixu Wang, Shichao Xu, Xiao Wang, Qi Zhu | Published: 2019-10-14 | Updated: 2019-10-27

Reliable Federated Learning for Mobile Networks

Authors: Jiawen Kang, Zehui Xiong, Dusit Niyato, Yuze Zou, Yang Zhang, Mohsen Guizani | Published: 2019-10-14

Policy Poisoning in Batch Reinforcement Learning and Control

Authors: Yuzhe Ma, Xuezhou Zhang, Wen Sun, Xiaojin Zhu | Published: 2019-10-13 | Updated: 2019-10-31

On Robustness of Neural Ordinary Differential Equations

Authors: Hanshu Yan, Jiawei Du, Vincent Y. F. Tan, Jiashi Feng | Published: 2019-10-12 | Updated: 2022-03-03

Extraction of Complex DNN Models: Real Threat or Boogeyman?

Authors: Buse Gul Atli, Sebastian Szyller, Mika Juuti, Samuel Marchal, N. Asokan | Published: 2019-10-11 | Updated: 2020-05-27

Hear “No Evil”, See “Kenansville”: Efficient and Transferable Black-Box Attacks on Speech Recognition and Voice Identification Systems

Authors: Hadi Abdullah, Muhammad Sajidur Rahman, Washington Garcia, Logan Blue, Kevin Warren, Anurag Swarnim Yadav, Tom Shrimpton, Patrick Traynor | Published: 2019-10-11

Defending Neural Backdoors via Generative Distribution Modeling

Authors: Ximing Qiao, Yukun Yang, Hai Li | Published: 2019-10-10 | Updated: 2019-11-06

Adversarial Training: embedding adversarial perturbations into the parameter space of a neural network to build a robust system

Authors: Shixian Wen, Laurent Itti | Published: 2019-10-09

Membership Model Inversion Attacks for Deep Networks

Authors: Samyadeep Basu, Rauf Izmailov, Chris Mesterharm | Published: 2019-10-09

Defensive Escort Teams via Multi-Agent Deep Reinforcement Learning

Authors: Arpit Garg, Yazied A. Hasan, Adam Yañez, Lydia Tapia | Published: 2019-10-09