Showing 341–360 of 468 results
/ Date/ Name
Nov 6, 2022MAIL: Malware Analysis Intermediate LanguageOct 19, 2022Canary in a Coalmine: Better Membership Inference with Ensembled Adversarial QueriesOct 4, 2022Invariant Aggregator for Defending against Federated Backdoor AttacksOct 3, 2022Red-Teaming the Stable Diffusion Safety FilterSep 19, 2022A Secure Authentication Framework to Guarantee the Traceability of Avatars in MetaverseSep 18, 2022Distribution inference risks: Identifying and mitigating sources of leakageSep 4, 2022Data Provenance via Differential AuditingSep 2, 2022Exploiting Fairness to Enhance Sensitive Attributes ReconstructionJul 4, 2022Cybersecurity: Past, Present and FutureJun 16, 2022BlindFL: Vertical Federated Machine Learning without Peeking into Your DataMay 20, 2022Getting a-Round Guarantees: Floating-Point Attacks on Certified RobustnessApr 18, 2022Experimental measurement-device-independent type quantum key distribution with flawed and correlated sourcesApr 8, 2022CFL: Cluster Federated Learning in Large-scale Peer-to-Peer NetworksMar 5, 2022The Impact of Differential Privacy on Group Disparity MitigationMar 5, 2022Towards an Antivirus for Quantum ComputersJan 24, 2022Backdoor Defense with Machine UnlearningJan 3, 2022Execute Order 66: Targeted Data Poisoning for Reinforcement LearningDec 22, 2021Breaking the Rate-Loss Bound of Quantum Key Distribution with Asynchronous Two-Photon InterferenceDec 10, 2021Are We There Yet? Timing and Floating-Point Attacks on Differential Privacy SystemsNov 12, 2021A lightweight blockchain-based access control scheme for integrated edge computing in the internet of things