Analytical Composition of Differential Privacy via the Edgeworth Accountant Authors: Hua Wang, Sheng Gao, Huanyu Zhang, Milan Shen, Weijie J. Su | Published: 2022-06-09 Privacy AssessmentFederated LearningFunction Definition 2022.06.09 2025.05.28 Literature Database
Generative Adversarial Networks and Image-Based Malware Classification Authors: Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp | Published: 2022-06-08 Prompt InjectionMalware Propagation MeansImage Forensics 2022.06.08 2025.05.28 Literature Database
To remove or not remove Mobile Apps? A data-driven predictive model approach Authors: Fadi Mohsen, Dimka Karastoyanova, George Azzopardi | Published: 2022-06-08 Data Management SystemUser Behavior AnalysisFeature Engineering 2022.06.08 2025.05.28 Literature Database
Gradient Obfuscation Gives a False Sense of Security in Federated Learning Authors: Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai | Published: 2022-06-08 | Updated: 2022-10-14 Attack Methods against DFLPoisoningReconstruction Durability 2022.06.08 2025.05.28 Literature Database
Dap-FL: Federated Learning flourishes by adaptive tuning and secure aggregation Authors: Qian Chen, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin | Published: 2022-06-08 Reinforcement LearningDeep Learning MethodFederated Learning 2022.06.08 2025.05.28 Literature Database
Rate Distortion Tradeoff in Private Read Update Write in Federated Submodel Learning Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-06-07 Data Management SystemPrivacy AssessmentFederated Learning 2022.06.07 2025.05.28 Literature Database
Group privacy for personalized federated learning Authors: Filippo Galli, Sayan Biswas, Kangsoo Jung, Tommaso Cucinotta, Catuscia Palamidessi | Published: 2022-06-07 | Updated: 2022-09-04 Privacy AssessmentPoisoningFederated Learning 2022.06.07 2025.05.28 Literature Database
Data Stealing Attack on Medical Images: Is it Safe to Export Networks from Data Lakes? Authors: Huiyu Li, Nicholas Ayache, Hervé Delingette | Published: 2022-06-07 Attack Methods against DFLPrivacy AssessmentMembership Inference 2022.06.07 2025.05.28 Literature Database
Building Robust Ensembles via Margin Boosting Authors: Dinghuai Zhang, Hongyang Zhang, Aaron Courville, Yoshua Bengio, Pradeep Ravikumar, Arun Sai Suggala | Published: 2022-06-07 PoisoningRobustnessAdversarial Attack Methods 2022.06.07 2025.05.28 Literature Database
Improving Adversarial Robustness by Putting More Regularizations on Less Robust Samples Authors: Dongyoon Yang, Insung Kong, Yongdai Kim | Published: 2022-06-07 | Updated: 2023-06-01 RobustnessAdversarial ExampleAdversarial Attack Methods 2022.06.07 2025.05.28 Literature Database