
-
Resource Allocation in One-dimensional Distributed Service Networks with Applications
We consider assignment policies that allocate resources to users, where ...
read it
-
You Do (Not) Belong Here: Detecting DPI Evasion Attacks with Context Learning
As Deep Packet Inspection (DPI) middleboxes become increasingly popular,...
read it
-
Connecting the Dots: Detecting Adversarial Perturbations Using Context Inconsistency
There has been a recent surge in research on adversarial perturbations t...
read it
-
Sharing Models or Coresets: A Study based on Membership Inference Attack
Distributed machine learning generally aims at training a global model b...
read it
-
A4 : Evading Learning-based Adblockers
Efforts by online ad publishers to circumvent traditional ad blockers to...
read it
-
Geometric Laplacian Eigenmap Embedding
Graph embedding seeks to build a low-dimensional representation of a gra...
read it
-
Learning and Planning in Feature Deception Games
Today's high-stakes adversarial interactions feature attackers who const...
read it
-
Robust Coreset Construction for Distributed Machine Learning
Motivated by the need of solving machine learning problems over distribu...
read it
-
Resource Allocation in One-dimensional Distributed Service Networks
We consider assignment policies that allocate resources to users, where ...
read it
-
A queueing-theoretic model for resource allocation in one-dimensional distributed service network
We consider assignment policies that allocate resources to requesting us...
read it