firstbacksecondback
22 Results
Workshop
|
Fri 7:00 |
Secure and Safe Autonomous Driving in Adversarial Environments Bo Li |
|
Poster
|
SCALE-UP: An Efficient Black-box Input-level Backdoor Detection via Analyzing Scaled Prediction Consistency Junfeng Guo · Yiming Li · Xun Chen · Hanqing Guo · Lichao Sun · Cong Liu |
||
Poster
|
MPCFORMER: FAST, PERFORMANT AND PRIVATE TRANSFORMER INFERENCE WITH MPC Dacheng Li · Hongyi Wang · Rulin Shao · Han Guo · Eric Xing · Hao Zhang |
||
Poster
|
On the Trade-Off between Actionable Explanations and the Right to be Forgotten Martin Pawelczyk · Tobias Leemann · Asia Biega · Gjergji Kasneci |
||
Poster
|
Defending against Adversarial Audio via Diffusion Model Shutong Wu · Jiongxiao Wang · Wei Ping · Weili Nie · Chaowei Xiao |
||
Poster
|
Federated Learning from Small Datasets Michael Kamp · Jonas Fischer · Jilles Vreeken |
||
Oral
|
Wed 1:10 |
Localized Randomized Smoothing for Collective Robustness Certification Jan Schuchardt · Tom Wollschläger · Aleksandar Bojchevski · Stephan Günnemann |
|
Poster
|
Wed 2:30 |
Perfectly Secure Steganography Using Minimum Entropy Coupling Christian Schroeder de Witt · Samuel Sokota · Zico Kolter · Jakob Foerster · Martin Strohmeier |
|
Oral
|
Mon 1:20 |
Is Adversarial Training Really a Silver Bullet for Mitigating Data Poisoning? Rui Wen · Zhengyu Zhao · Zhuoran Liu · Michael Backes · Tianhao Wang · Yang Zhang |
|
Poster
|
Mon 7:30 |
Iterative Circuit Repair Against Formal Specifications Matthias Cosler · Frederik Schmitt · Christopher Hahn · Bernd Finkbeiner |
|
Poster
|
MACTA: A Multi-agent Reinforcement Learning Approach for Cache Timing Attacks and Detection Jiaxun Cui · Xiaomeng Yang · Mulong Luo · Geunbae Lee · Peter Stone · Hsien-Hsin Lee · Benjamin Lee · G. Edward Suh · Wenjie Xiong · Yuandong Tian |
||
Poster
|
Wed 2:30 |
Localized Randomized Smoothing for Collective Robustness Certification Jan Schuchardt · Tom Wollschläger · Aleksandar Bojchevski · Stephan Günnemann |