Website Fingerprinting (WF) is considered a major threat to the anonymit...
A key component of generating text from modern language models (LM) is t...
Split Learning (SL) and Federated Learning (FL) are two prominent distri...
Semi-supervised machine learning (SSL) is gaining popularity as it reduc...
Federated Learning (FL) enables data owners to train a shared global mod...
Membership inference attacks are a key measure to evaluate privacy leaka...
Federated learning (FL) allows multiple clients with (private) data to
c...
User privacy can be compromised by matching user data traces to records ...
While recent works have indicated that federated learning (FL) is vulner...
Deep Neural Networks (DNNs) have become prevalent in wireless communicat...
Deep learning models leak significant amounts of information about their...
The Internet of Things (IoT) promises to improve user utility by tuning
...
Instant Messaging (IM) applications like Telegram, Signal, and WhatsApp ...
Deep Neural Networks (DNNs) are commonly used for various traffic analys...
Collaborative (federated) learning enables multiple parties to train a m...
The prevalence of mobile devices and Location-Based Services (LBS)
neces...
Large capacity machine learning models are prone to membership inference...
Covert communication conceals the existence of the transmission from a
w...
Various modern and highly popular applications make use of user data tra...
Deep neural networks are susceptible to various inference attacks as the...
Covert communication is necessary when revealing the mere existence of a...
Rapid growth of the Internet of Things (IoT) necessitates employing
priv...
Network flow fingerprinting can be used to de-anonymize communications o...
Flow correlation is the core technique used in a multitude of deanonymiz...
Machine learning models leak information about the datasets on which the...
Modern applications significantly enhance user experience by adapting to...
Modern applications significantly enhance user experience by adapting to...
Network traffic analysis reveals important information even when message...
A core technique used by popular proxy-based circumvention systems like ...