Artificial intelligence (AI) researchers have been developing and refini...
Machine unlearning aims to remove points from the training dataset of a
...
Proof-of-learning (PoL) proposes a model owner use machine learning trai...
It is perhaps no longer surprising that machine learning models, especia...
Federated learning (FL), where data remains at the federated clients, an...
As social robots become increasingly prevalent in day-to-day environment...
Machine unlearning is the process through which a deployed machine learn...
The application of machine learning (ML) in computer systems introduces ...
Machine learning (ML) models are known to be vulnerable to adversarial
e...
Training machine learning (ML) models typically involves expensive itera...
Detecting anomalous inputs, such as adversarial and out-of-distribution ...
Advances in deep learning have made face recognition increasingly feasib...
Machine learning algorithms are vulnerable to data poisoning attacks. Pr...
Once users have shared their data online, it is generally difficult for ...
Machine learning (ML) algorithms, especially deep neural networks, have
...
Recent advances in Machine Learning (ML) have demonstrated that neural
n...
The increasing pervasiveness of voice assistants in the home poses sever...
Machine learning is being increasingly used by individuals, research
ins...