dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation Authors: Sofiane Mahiou, Kai Xu, Georgi Ganev | Published: 2022-07-12 Algorithm DesignPrivacy ProtectionPrivacy Enhancing Technology 2022.07.12 2025.05.28 Literature Database
RelaxLoss: Defending Membership Inference Attacks without Losing Utility Authors: Dingfan Chen, Ning Yu, Mario Fritz | Published: 2022-07-12 Membership InferenceModel Performance EvaluationLoss Term 2022.07.12 2025.05.28 Literature Database
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware Authors: Luca Demetrio, Battista Biggio, Fabio Roli | Published: 2022-07-12 Attack Methods against DFLPoisoningMalware Propagation Means 2022.07.12 2025.05.28 Literature Database
Federated Unlearning: How to Efficiently Erase a Client in FL? Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo | Published: 2022-07-12 | Updated: 2023-10-20 Client Data DeletionBackdoor AttackModel Performance Evaluation 2022.07.12 2025.05.28 Literature Database
Efficient and Privacy Preserving Group Signature for Federated Learning Authors: Sneha Kanchan, Jae Won Jang, Jun Yong Yoon, Bong Jun Choi | Published: 2022-07-12 | Updated: 2022-07-15 Group SignaturePoisoningCommunication Efficiency 2022.07.12 2025.05.28 Literature Database
Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility Authors: Behrooz Razeghi, Flavio P. Calmon, Deniz Gunduz, Slava Voloshynovskiy | Published: 2022-07-11 Algorithm DesignInformation-Theoretic PrivacyOptimization Methods 2022.07.11 2025.05.28 Literature Database
Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems Authors: Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim | Published: 2022-07-11 PoisoningAttack TypeAdversarial Learning 2022.07.11 2025.05.28 Literature Database
SALSA: Attacking Lattice Cryptography with Transformers Authors: Emily Wenger, Mingjie Chen, François Charton, Kristin Lauter | Published: 2022-07-11 | Updated: 2023-04-21 Algorithm DesignModel Design and AccuracyOptimization Methods 2022.07.11 2025.05.28 Literature Database
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning Authors: Owen Millwood, Jack Miskelly, Bohao Yang, Prosanta Gope, Elif Kavun, Chenghua Lin | Published: 2022-07-11 Algorithm DesignModel Design and AccuracyDefense Method 2022.07.11 2025.05.28 Literature Database
How many perturbations break this model? Evaluating robustness beyond adversarial accuracy Authors: Raphael Olivier, Bhiksha Raj | Published: 2022-07-08 | Updated: 2023-08-10 Model Design and AccuracyAdversarial TrainingDefense Method 2022.07.08 2025.05.28 Literature Database