Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif | Published: 2022-07-05 Privacy ProtectionPoisoningDefense Method 2022.07.05 2025.05.28 Literature Database
Best Subset Selection with Efficient Primal-Dual Algorithm Authors: Shaogang Ren, Guanhua Fang, Ping Li | Published: 2022-07-05 Algorithm DesignOptimization ProblemFeature Selection Method 2022.07.05 2025.05.28 Literature Database
Defending against the Label-flipping Attack in Federated Learning Authors: Najeeb Moharram Jebreel, Josep Domingo-Ferrer, David Sánchez, Alberto Blanco-Justicia | Published: 2022-07-05 Algorithm DesignPoisoningDefense Method 2022.07.05 2025.05.28 Literature Database
Federated Split GANs Authors: Pranvera Kortoçi, Yilei Liang, Pengyuan Zhou, Lik-Hang Lee, Abbas Mehrabi, Pan Hui, Sasu Tarkoma, Jon Crowcroft | Published: 2022-07-04 Privacy ProtectionEfficiency of Distributed LearningChallenges of Generative Models 2022.07.04 2025.05.28 Literature Database
Machine Learning in Access Control: A Taxonomy and Survey Authors: Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu | Published: 2022-07-04 Dynamic Access ControlMachine Learning ApplicationFeature Selection Method 2022.07.04 2025.05.28 Literature Database
Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate Authors: Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu | Published: 2022-07-04 Review and InvestigationInformation Gathering MethodsDeception Detection 2022.07.04 2025.05.28 Literature Database
High-Dimensional Private Empirical Risk Minimization by Greedy Coordinate Descent Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2022-07-04 | Updated: 2023-04-09 Algorithm DesignConvergence GuaranteeSelection and Evaluation of Optimization Algorithms 2022.07.04 2025.05.28 Literature Database
Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04 Network SlicingRisk Assessment MethodAdversarial Learning 2022.07.04 2025.05.28 Literature Database
Cybersecurity: Past, Present and Future Authors: Shahid Alam | Published: 2022-07-04 | Updated: 2024-03-03 Storage DeviceDigital ForensicsMalware Detection 2022.07.04 2025.05.28 Literature Database
Ransomware Classification and Detection With Machine Learning Algorithms Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02 Backdoor AttackDynamic AnalysisEvaluation Method 2022.07.02 2025.05.28 Literature Database