With rich visual data, such as images, becoming readily associated with
...
The increasing reliance on Large Language Models (LLMs) across academia ...
A generative AI model – such as DALL-E, Stable Diffusion, and ChatGPT – ...
Data poisoning attacks spoof a recommender system to make arbitrary,
att...
Point cloud classification is an essential component in many
security-cr...
Encoder as a service is an emerging cloud service. Specifically, a servi...
Federated learning (FL) is an emerging machine learning paradigm, in whi...
Classifiers in supervised learning have various security and privacy iss...
Contrastive learning (CL) pre-trains general-purpose encoders using an
u...
Federated learning (FL) allows multiple clients to collaboratively train...
Federated learning is vulnerable to poisoning attacks in which malicious...
Multi-label classification, which predicts a set of labels for an input,...
Due to its distributed nature, federated learning is vulnerable to poiso...
Federated learning (FL) is vulnerable to model poisoning attacks, in whi...
Local differential privacy (LDP) protects individual data contributors
a...
Contrastive learning pre-trains an image encoder using a large amount of...
Existing model poisoning attacks to federated learning assume that an
at...
Cross-device tracking has drawn growing attention from both commercial
c...
Pre-trained encoders are general-purpose feature extractors that can be ...
With the recent demand of deploying neural network models on mobile and ...
Local Differential Privacy (LDP) protocols enable an untrusted server to...
Self-supervised learning has achieved revolutionary progress in the past...
Existing deepfake-detection methods focus on passive detection, i.e., th...
Given a set of unlabeled images or (image, text) pairs, contrastive lear...
Self-supervised learning in computer vision aims to pre-train an image
e...
Deepfakes pose growing challenges to the trust of information on the
Int...
Self-attention has become increasingly popular in a variety of sequence
...
Sequential recommendation plays an increasingly important role in many
e...
3D point cloud classification has many safety-critical applications such...
A key challenge of big data analytics is how to collect a large volume o...
Federated learning enables clients to collaboratively learn a shared glo...
Recommender systems play a crucial role in helping users to find their
i...
Membership inference (MI) attacks affect user privacy by inferring wheth...
Byzantine-robust federated learning aims to enable a service provider to...
Semi-supervised node classification on graph-structured data has many
ap...
Data poisoning attacks aim to corrupt a machine learning model via modif...
Top-k predictions are used in many real-world applications such as machi...
In the era of deep learning, a user often leverages a third-party machin...
Graph neural networks (GNNs) have recently gained much attention for nod...
Differentially private machine learning trains models while protecting
p...
In a data poisoning attack, an attacker modifies, deletes, and/or
insert...
Node classification and graph classification are two basic graph analyti...
Graph data, such as social networks and chemical networks, contains a we...
Backdoor attack is a severe security threat to deep neural networks (DNN...
Recommender system is an essential component of web services to engage u...
Community detection plays a key role in understanding graph structure.
H...
It is well-known that classifiers are vulnerable to adversarial
perturba...
In federated learning, multiple client devices jointly learn a machine
l...
Local Differential Privacy (LDP) protocols enable an untrusted data coll...
A deep neural network (DNN) classifier represents a model owner's
intell...