Data poisoning attacks spoof a recommender system to make arbitrary,
att...
Point cloud classification is an essential component in many
security-cr...
Encoder as a service is an emerging cloud service. Specifically, a servi...
Classifiers in supervised learning have various security and privacy iss...
Contrastive learning (CL) pre-trains general-purpose encoders using an
u...
Federated learning is vulnerable to poisoning attacks in which malicious...
Multi-label classification, which predicts a set of labels for an input,...
Due to its distributed nature, federated learning is vulnerable to poiso...
Federated learning (FL) is vulnerable to model poisoning attacks, in whi...
Contrastive learning pre-trains an image encoder using a large amount of...
Pre-trained encoders are general-purpose feature extractors that can be ...
Local Differential Privacy (LDP) protocols enable an untrusted server to...
Self-supervised learning has achieved revolutionary progress in the past...
Given a set of unlabeled images or (image, text) pairs, contrastive lear...
Self-supervised learning in computer vision aims to pre-train an image
e...
3D point cloud classification has many safety-critical applications such...
Federated learning enables clients to collaboratively learn a shared glo...
Semi-supervised node classification on graph-structured data has many
ap...
Data poisoning attacks aim to corrupt a machine learning model via modif...
Top-k predictions are used in many real-world applications such as machi...
In the era of deep learning, a user often leverages a third-party machin...
Graph neural networks (GNNs) have recently gained much attention for nod...
Differentially private machine learning trains models while protecting
p...
In a data poisoning attack, an attacker modifies, deletes, and/or
insert...
Node classification and graph classification are two basic graph analyti...
Graph data, such as social networks and chemical networks, contains a we...
Backdoor attack is a severe security threat to deep neural networks (DNN...
Community detection plays a key role in understanding graph structure.
H...
It is well-known that classifiers are vulnerable to adversarial
perturba...
In federated learning, multiple client devices jointly learn a machine
l...
Local Differential Privacy (LDP) protocols enable an untrusted data coll...
A deep neural network (DNN) classifier represents a model owner's
intell...
In a membership inference attack, an attacker aims to infer whether a da...
As machine learning (ML) becomes more and more powerful and easily
acces...
Root is an important organ of a plant since it is responsible for water ...
Estimating frequencies of certain items among a population is a basic st...
Many security and privacy problems can be modeled as a graph classificat...
Users in various web and mobile applications are vulnerable to attribute...
Sybil detection in social networks is a basic security research problem....