SoK: Assessing the State of Applied Federated Machine Learning Authors: Tobias Müller, Maximilian Stäbler, Hugo Gascón, Frank Köster, Florian Matthes | Published: 2023-08-03 Scalability AnalysisData Protection MethodFederated Learning 2023.08.03 2025.05.28 Literature Database
Integrating Homomorphic Encryption and Trusted Execution Technology for Autonomous and Confidential Model Refining in Cloud Authors: Pinglan Liu, Wensheng Zhang | Published: 2023-08-02 Multi-Party ComputationDeep Learning MethodWatermark Robustness 2023.08.02 2025.05.28 Literature Database
Isolation and Induction: Training Robust Deep Neural Networks against Model Stealing Attacks Authors: Jun Guo, Aishan Liu, Xingyu Zheng, Siyuan Liang, Yisong Xiao, Yichao Wu, Xianglong Liu | Published: 2023-08-02 | Updated: 2023-08-03 Adversarial ExampleAdversarial attackWatermark Robustness 2023.08.02 2025.05.28 Literature Database
IIDS: Design of Intelligent Intrusion Detection System for Internet-of-Things Applications Authors: KG Raghavendra Narayan, Srijanee Mookherji, Vanga Odelu, Rajendra Prasath, Anish Chand Turlapaty, Ashok Kumar Das | Published: 2023-08-02 IoT Device IdentificationData PreprocessingVulnerability detection 2023.08.02 2025.05.28 Literature Database
Differential Privacy for Adaptive Weight Aggregation in Federated Tumor Segmentation Authors: Muhammad Irfan Khan, Esa Alhoniemi, Elina Kontio, Suleiman A. Khan, Mojtaba Jafaritadi | Published: 2023-08-01 Watermarking Settings for Medical DataWatermark RobustnessFederated Learning 2023.08.01 2025.05.28 Literature Database
Differentially Private Linear Regression with Linked Data Authors: Shurong Lin, Elliot Paquette, Eric D. Kolaczyk | Published: 2023-08-01 | Updated: 2024-05-08 Secure Logistic RegressionData GenerationPrivacy Protection Method 2023.08.01 2025.05.28 Literature Database
Semisupervised Anomaly Detection using Support Vector Regression with Quantum Kernel Authors: Kilian Tscharke, Sebastian Issel, Pascal Debus | Published: 2023-08-01 | Updated: 2024-01-03 Data GenerationVulnerability detectionQuantum Cryptography Technology 2023.08.01 2025.05.28 Literature Database
Robust Linear Regression: Phase-Transitions and Precise Tradeoffs for General Norms Authors: Elvis Dohmatob, Meyer Scetbon | Published: 2023-08-01 Adversarial attackOptimization MethodsLinear Model 2023.08.01 2025.05.28 Literature Database
Compressed Private Aggregation for Scalable and Robust Federated Learning over Massive Networks Authors: Natalie Lang, Nir Shlezinger, Rafael G. L. D'Oliveira, Salim El Rouayheb | Published: 2023-08-01 | Updated: 2025-05-08 Scalability AnalysisPrivacy Protection MethodFederated Learning 2023.08.01 2025.05.28 Literature Database
Doubly Robust Instance-Reweighted Adversarial Training Authors: Daouda Sow, Sen Lin, Zhangyang Wang, Yingbin Liang | Published: 2023-08-01 Adversarial attackOptimization MethodsDeep Learning Method 2023.08.01 2025.05.28 Literature Database