To ensure that secure applications do not leak their secrets, they are
r...
Transfer adversarial attacks raise critical security concerns in real-wo...
Heuristics for user experience state that users will transfer their
expe...
Chatbots are used in many applications, e.g., automated agents, smart ho...
Scripting languages are continuously gaining popularity due to their eas...
The Android middleware, in particular the so-called systemserver, is a
c...
Graph is an important data representation ubiquitously existing in the r...
Although machine learning (ML) is widely used in practice, little is kno...
The right to be forgotten states that a data subject has the right to er...
Many real-world data comes in the form of graphs, such as social network...
Inference attacks against Machine Learning (ML) models allow adversaries...
In differential privacy (DP), a challenging problem is to generate synth...
Backdoor attack against deep neural networks is currently being profound...
The tremendous progress of autoencoders and generative adversarial netwo...
While being deployed in many critical applications as core components,
m...
Adversarial examples are a type of attack on machine learning (ML) syste...
The recent lottery ticket hypothesis proposes that there is one sub-netw...
Overfitting describes the phenomenon that a machine learning model fits ...
Machine learning (ML) has progressed rapidly during the past decade and ...
An ever-growing body of work has demonstrated the rich information conte...
This document describes and analyzes a system for secure and
privacy-pre...
The right to be forgotten states that a data owner has the right to eras...
Graph data, such as social networks and chemical networks, contains a we...
Astroturfing, i.e., the fabrication of public discourse by private or
st...
Machine learning (ML) has made tremendous progress during the past decad...
Causality has been the issue of philosophic debate since Hippocrates. It...
In a membership inference attack, an attacker aims to infer whether a da...
Machine learning (ML) classification is increasingly used in safety-crit...
Memory corruption vulnerabilities often enable attackers to take control...
Machine learning (ML) has progressed rapidly during the past decade and ...
The increase in computational power and available data has fueled a wide...
Machine learning models are vulnerable to adversarial examples: minor
pe...
Users regularly enter sensitive data, such as passwords, credit card num...
With the widespread use of machine learning (ML) techniques, ML as a ser...
The wide usage of Machine Learning (ML) has lead to research on the atta...
Machine learning (ML) has become a core component of many real-world
app...
Accounting for misbehavior, instead of postulating trustworthiness, has ...
Hashtag has emerged as a widely used concept of popular culture and
camp...
Despite their well-known security problems, passwords are still the incu...
Machine learning models are vulnerable to adversarial examples: minor, i...
Social graphs derived from online social interactions contain a wealth o...
Penetration testing is a well-established practical concept for the
iden...
Machine Learning (ML) models are applied in a variety of tasks such as
n...
Deep neural networks, like many other machine learning models, have rece...