A Framework for Practical Anonymous Credentials from LatticesJonathan BootleVadim Lyubashevskyet al.2023CRYPTO 2023
URET: Universal Robustness Evaluation Toolkit (for Evasion)Kevin EykholtTaesung Leeet al.2023USENIX Security 2023
Not All Data are Created Equal: Data and Pointer Prioritization for Scalable Protection Against Data-Oriented AttacksSalman AhmedHans Liljestrandet al.2023USENIX Security 2023
Unifying Molecular and Textual Representations via Multi-task Language ModellingDimitrios ChristofidellisGiorgio Giannoneet al.2023ICML 2023
Probabilistic Attention-to-Influence Neural Models for Event SequencesXiao ShouDebarun Bhattacharjyaet al.2023ICML 2023
Prometheus: Taming Sample and Communication Complexities in Constrained Decentralized Stochastic Bilevel LearningZhuqing LiuXin Zhanget al.2023ICML 2023
Compressed Decentralized Proximal Stochastic Gradient Method for Nonconvex Composite Problems with Heterogeneous DataYonggui YanJie Chenet al.2023ICML 2023