Default Cover Image

2024 IEEE Conference on Secure and Trustworthy Machine Learning (SaTML)

April 9 2024 to April 11 2024

Toronto, ON, Canada

ISBN: 979-8-3503-4950-4

Table of Contents

Title Page iFreely available from IEEE.pp. 1-1
Title Page iiiFreely available from IEEE.pp. 3-3
Copyright PageFreely available from IEEE.pp. 4-4
Table of ContentsFreely available from IEEE.pp. 5-9
Message from the Program ChairsFreely available from IEEE.pp. 10-10
Organizing CommitteeFreely available from IEEE.pp. 11-11
Program CommitteeFreely available from IEEE.pp. 12-14
Steering CommitteeFreely available from IEEE.pp. 15-15
Probabilistic Dataset Reconstruction from Interpretable ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 1-17
Shake to Leak: Fine-tuning Diffusion Models Can Amplify the Generative Privacy RiskFull-text access may be available. Sign in or learn about subscription options.pp. 18-32
SoK: A Review of Differentially Private Linear Models For High-Dimensional DataFull-text access may be available. Sign in or learn about subscription options.pp. 57-77
Concentrated Differential Privacy for BanditsFull-text access may be available. Sign in or learn about subscription options.pp. 78-109
PILLAR: How to make semi-private learning more effectiveFull-text access may be available. Sign in or learn about subscription options.pp. 110-139
Fair Federated Learning via Bounded Group LossFull-text access may be available. Sign in or learn about subscription options.pp. 140-160
Evaluating Superhuman Models with Consistency ChecksFull-text access may be available. Sign in or learn about subscription options.pp. 194-232
Certifiably Robust Reinforcement Learning through Model-Based Abstract InterpretationFull-text access may be available. Sign in or learn about subscription options.pp. 233-251
Fast Certification of Vision-Language Models Using Incremental Randomized SmoothingFull-text access may be available. Sign in or learn about subscription options.pp. 252-271
Backdoor Attack on Unpaired Medical Image-Text Foundation Models: A Pilot Study on MedCLIPFull-text access may be available. Sign in or learn about subscription options.pp. 272-285
REStore: Exploring a Black-Box Defense against DNN Backdoors using Rare Event SimulationFull-text access may be available. Sign in or learn about subscription options.pp. 286-308
EdgePruner: Poisoned Edge Pruning in Graph Contrastive LearningFull-text access may be available. Sign in or learn about subscription options.pp. 309-326
Indiscriminate Data Poisoning Attacks on Pre-trained Feature ExtractorsFull-text access may be available. Sign in or learn about subscription options.pp. 327-343
The Devil’s Advocate: Shattering the Illusion of Unexploitable Data using Diffusion ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 358-386
SoK: Pitfalls in Evaluating Black-Box AttacksFull-text access may be available. Sign in or learn about subscription options.pp. 387-407
Evading Black-box Classifiers Without Breaking EggsFull-text access may be available. Sign in or learn about subscription options.pp. 408-424
Segment (Almost) Nothing: Prompt-Agnostic Adversarial Attacks on Segmentation ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 425-442
Improving Privacy-Preserving Vertical Federated Learning by Efficient Communication with ADMMFull-text access may be available. Sign in or learn about subscription options.pp. 443-471
Differentially Private Multi-Site Treatment Effect EstimationFull-text access may be available. Sign in or learn about subscription options.pp. 472-489
Model Reprogramming Outperforms Fine-tuning on Out-of-distribution Data in Text-Image EncodersFull-text access may be available. Sign in or learn about subscription options.pp. 552-568
Data Redaction from Conditional Generative ModelsFull-text access may be available. Sign in or learn about subscription options.pp. 569-591
Towards Scalable and Robust Model VersioningFull-text access may be available. Sign in or learn about subscription options.pp. 592-611
AI auditing: The Broken Bus on the Road to AI AccountabilityFull-text access may be available. Sign in or learn about subscription options.pp. 612-643
Under manipulations, are some AI models harder to audit?Full-text access may be available. Sign in or learn about subscription options.pp. 644-664
Navigating the Structured What-If Spaces: Counterfactual Generation via Structured DiffusionFull-text access may be available. Sign in or learn about subscription options.pp. 710-722
Author IndexFreely available from IEEE.pp. 741-742
Showing 43 out of 43