We introduce SABRE, a novel framework for robust variational Bayesian
pe...
Adaptive Cruise Control (ACC) is a widely used driver assistance feature...
Emerging multi-robot systems rely on cooperation between humans and robo...
We study backdoor attacks in peer-to-peer federated learning systems on
...
The Weighted-Mean Subsequence Reduced (W-MSR) algorithm, the state-of-th...
Federated learning is a popular strategy for training models on distribu...
The rise of Ethereum has lead to a flourishing decentralized marketplace...
We present ShorTor, a protocol for reducing latency on the Tor network.
...
Automated attack discovery techniques, such as attacker synthesis or
mod...
Payment systems are a critical component of everyday life in our society...
Payment channel networks (PCN) enable scalable blockchain transactions
w...
Distributed protocols should be robust to both benign malfunction (e.g.
...
Home-based Internet of Things (IoT) devices have gained in popularity an...
Deep Neural Networks (DNNs) have tremendous potential in advancing the v...
Grammar-based fuzzing is a technique used to find software vulnerabiliti...
Transferability captures the ability of an attack against a machine-lear...
As machine learning becomes widely used for automated decisions, attacke...