Dropout is a common operator in deep learning, aiming to prevent overfit...
As machine learning (ML) classifiers increasingly oversee the automated
...
Transfer learning has become an increasingly popular technique in machin...
We present a rigorous methodology for auditing differentially private ma...
Privacy auditing techniques for differentially private (DP) algorithms a...
We study backdoor attacks in peer-to-peer federated learning systems on
...
Recent work by Jia et al., showed the possibility of effectively computi...
Federated learning is a popular strategy for training models on distribu...
Property inference attacks allow an adversary to extract global properti...
Binary analyses based on deep neural networks (DNNs), or neural binary
a...
Self-propagating malware (SPM) has recently resulted in large financial
...
Self-propagating malware (SPM) has led to huge financial losses, major d...
The cyber-threat landscape has evolved tremendously in recent years, wit...
Secure multiparty computation (MPC) has been proposed to allow multiple
...
A large body of research has shown that machine learning models are
vuln...
Recent self-propagating malware (SPM) campaigns compromised hundred of
t...
In recent years, enterprises have been targeted by advanced adversaries ...
Probabilistic model checking is a useful technique for specifying and
ve...
Recently, coordinated attack campaigns started to become more widespread...
Research and development of techniques which detect or remediate malicio...
It has become common to publish large (billion parameter) language model...
Machine learning (ML) systems are deployed in critical settings, but the...
We investigate whether Differentially Private SGD offers better privacy ...
Current training pipelines for machine learning (ML) based malware
class...
As advances in Deep Neural Networks demonstrate unprecedented levels of
...
Web applications in widespread use have always been the target of large-...
Home-based Internet of Things (IoT) devices have gained in popularity an...
Machine learning (ML) started to become widely deployed in cyber securit...
A rise in Advanced Persistent Threats (APTs) has introduced a need for
r...
A rise in Advanced Persistant Threats (APTs) has introduced a need for
r...
Deep Neural Networks (DNNs) have tremendous potential in advancing the v...
Machine Learning (ML) is widely used for predictive tasks in a number of...
We design two learning algorithms that simultaneously promise differenti...
Transferability captures the ability of an attack against a machine-lear...
As machine learning becomes widely used for automated decisions, attacke...
The effectiveness of supervised learning techniques has made them ubiqui...