Showing 381–400 of 468 results
/ Date/ Name
Sep 21, 2020Modeling Techniques for Logic LockingSep 20, 2020On Certificate Management in Named Data NetworkingSep 19, 2020Learning to Attack: Towards Textual Adversarial Attacking in Real-world SituationsSep 13, 2020Differentially Private Language Models Benefit from Public Pre-trainingSep 11, 2020MACE: A Flexible Framework for Membership Privacy Estimation in Generative ModelsSep 3, 2020Model extraction from counterfactual explanationsAug 20, 2020When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk ControlAug 19, 2020Toward Smart Security Enhancement of Federated Learning NetworksAug 13, 2020Can We Trust Your Explanations? Sanity Checks for Interpreters in Android Malware AnalysisAug 13, 2020An Empirical Evaluation of GDPR Compliance Violations in Android mHealth AppsJul 25, 2020SOTERIA: In Search of Efficient Neural Networks for Private InferenceJun 30, 2020Model-Targeted Poisoning Attacks with Provable ConvergenceJun 12, 2020Leakage of Dataset Properties in Multi-Party Machine LearningJun 12, 2020Injecting Reliable Radio Frequency Fingerprints Using Metasurface for The Internet of ThingsJun 11, 2020Sovereign: User-Controlled Smart HomesMay 9, 2020Cloud-based Federated Boosting for Mobile CrowdsensingMay 5, 2020Breaking RSA Security With A Low Noise D-Wave 2000Q Quantum Annealer: Computational Times, Limitations And ProspectsApr 28, 2020Minority Reports Defense: Defending Against Adversarial PatchesApr 21, 2020Certifying Joint Adversarial Robustness for Model EnsemblesApr 1, 2020Botnet Detection Using Recurrent Variational Autoencoder