Machine Learning (ML) systems are vulnerable to adversarial examples,
pa...
Large language models (LLMs) have exhibited impressive capabilities in
c...
Differentially private stochastic gradient descent (DP-SGD) is the canon...
Randomness supports many critical functions in the field of machine lear...
While text-based machine learning models that operate on visual inputs o...
Stable Diffusion revolutionised image creation from descriptive text. GP...
Search engines are vulnerable to attacks against indexing and searching ...
Current literature demonstrates that Large Language Models (LLMs) are gr...
Federated learning (FL) is a framework for users to jointly train a mach...
Given the wide and ever growing range of different efficient Transformer...
The Transformer is an extremely powerful and prominent deep learning
arc...
Early backdoor attacks against machine learning set off an arms race in
...
Data augmentation is used extensively to improve model generalisation.
H...
When learning from sensitive data, care must be taken to ensure that tra...
Neural networks are susceptible to adversarial examples-small input
pert...
Defending against adversarial examples remains an open problem. A common...
Machine learning is vulnerable to adversarial manipulation. Previous
lit...
Differential Privacy (DP) is the de facto standard for reasoning about t...
Bayesian Neural Networks (BNNs) offer a mathematically grounded framewor...
Recent years have seen a surge of popularity of acoustics-enabled person...
In federated learning (FL), data does not leave personal devices when th...
Online extremism is a growing and pernicious problem, and increasingly l...
Machine unlearning, i.e. having a model forget about some of its trainin...
Network Architecture Search (NAS) methods have recently gathered much
at...
Several years of research have shown that machine-learning systems are
v...
Inpainting is a learned interpolation technique that is based on generat...
Machine learning is vulnerable to a wide variety of different attacks. I...
Voice assistants are now ubiquitous and listen in on our everyday lives....
The wide adaption of 3D point-cloud data in safety-critical applications...
Progress in generative modelling, especially generative adversarial netw...
In this paper, we present BatNet, a data transmission mechanism using
ul...
One of the most critical security protocol problems for humans is when y...
The high energy costs of neural network training and inference led to th...
Convolutional Neural Networks (CNNs) are deployed in more and more
class...
Recent research on reinforcement learning has shown that trained agents ...
We present the first acoustic side-channel attack that recovers what use...
Convolutional Neural Networks (CNNs) are widely used to solve classifica...
The first six months of 2018 have seen cryptocurrency thefts of 761 mill...
Cybercrime forums enable modern criminal entrepreneurs to collaborate wi...
Cybercrime forums enable modern criminal entrepreneurs to collaborate wi...
Deep Neural Networks (DNNs) have become a powerful tool for a wide range...
As deep neural networks (DNNs) become widely used, pruned and quantised
...