Artificial intelligence (AI) has seen a tremendous surge in capabilities...
Most existing approaches of differentially private (DP) machine learning...
In today's machine learning (ML) models, any part of the training data c...
Privacy-preserving instance encoding aims to encode raw data as feature
...
Self-supervised learning (SSL) algorithms can produce useful image
repre...
We propose a novel task for generating 3D dance movements that simultane...
We consider private federated learning (FL), where a server aggregates
d...
Differential privacy (DP) is by far the most widely accepted framework f...
Gradient inversion attack enables recovery of training samples from mode...
Split learning and inference propose to run training/inference of a larg...
Federated learning (FL) aims to perform privacy-preserving machine learn...
Inspired by the strong ties between vision and language, the two intimat...
Growing interests in RGB-D salient object detection (RGB-D SOD) have bee...
In this note, we initiate a rigorous study of the phenomenon of
low-dime...
Federated data analytics is a framework for distributed data analysis wh...
Label differential privacy (LDP) is a popular framework for training pri...
Differential privacy is widely accepted as the de facto method for preve...
Recent data-extraction attacks have exposed that language models can mem...
Federated learning (FL) enables clients to collaborate with a server to ...
Out-of-distribution (OOD) detection has received much attention lately d...
The vulnerability of machine learning models to membership inference att...
We aim to tackle the interesting yet challenging problem of generating v...
Neural network robustness has become a central topic in machine learning...
This paper focuses on a new problem of estimating human pose and shape f...
Event camera is an emerging imaging sensor for capturing dynamics of mov...
Machine learning models often encounter distribution shifts when deploye...
Federated learning has emerged as a popular paradigm for collaboratively...
We propose the first general-purpose gradient-based attack against
trans...
Machine-learning systems such as self-driving cars or virtual assistants...
Machine-learning models contain information about the data they were tra...
Most computer science conferences rely on paper bidding to assign review...
Action recognition is a relatively established task, where givenan input...
The complexity of large-scale neural networks can lead to poor understan...
Secure multiparty computations enable the distribution of so-called shar...
Good data stewardship requires removal of data at the request of the dat...
Natural images are virtually surrounded by low-density misclassified reg...
We propose an intriguingly simple method for the construction of adversa...
Recent studies have discovered the vulnerability of Deep Neural Networks...
Microblog has become a popular platform for people to post, share, and s...
Recently, machine learning security has received significant attention. ...
Evaluating generative adversarial networks (GANs) is inherently challeng...
This paper investigates strategies that defend against adversarial-examp...