Differentially Private Shapley Values for Data Evaluation Authors: Lauren Watson, Rayna Andreeva, Hao-Tsung Yang, Rik Sarkar | Published: 2022-06-01 Sample ComplexityPrivacy AssessmentLoss Term 2022.06.01 2025.05.28 Literature Database
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration Authors: Gibran Gomez, Pedro Moreno-Sanchez, Juan Caballero | Published: 2022-06-01 | Updated: 2022-10-18 Malware Detection MethodTransaction Profit and PerformanceFunding 2022.06.01 2025.05.28 Literature Database
Privacy for Free: How does Dataset Condensation Help Privacy? Authors: Tian Dong, Bo Zhao, Lingjuan Lyu | Published: 2022-06-01 Data Management SystemPrivacy AssessmentLoss Term 2022.06.01 2025.05.28 Literature Database
To Collaborate or Not in Distributed Statistical Estimation with Resource Constraints? Authors: Yu-Zhen Janice Chen, Daniel S. Menasche, Don Towsley | Published: 2022-05-31 Data Management SystemReduction of Communication CostsCommunication Model 2022.05.31 2025.05.28 Literature Database
Private Federated Submodel Learning with Sparsification Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-05-31 Data Management SystemPrivacy AssessmentReduction of Communication Costs 2022.05.31 2025.05.28 Literature Database
Hide and Seek: on the Stealthiness of Attacks against Deep Learning Systems Authors: Zeyan Liu, Fengjun Li, Jingqiang Lin, Zhu Li, Bo Luo | Published: 2022-05-31 | Updated: 2022-08-12 Attack Methods against DFLBackdoor AttackUser Activity Analysis 2022.05.31 2025.05.28 Literature Database
Dropbear: Machine Learning Marketplaces made Trustworthy with Byzantine Model Agreement Authors: Alex Shamis, Peter Pietzuch, Antoine Delignat-Lavaud, Andrew Paverd, Manuel Costa | Published: 2022-05-31 Membership InferenceTrust EvaluationCommunication Model 2022.05.31 2025.05.28 Literature Database
Integrity Authentication in Tree Models Authors: Weijie Zhao, Yingjie Lao, Ping Li | Published: 2022-05-30 | Updated: 2022-06-23 Identification of Signature KeySelection MethodHierarchical Classification Methods 2022.05.30 2025.05.28 Literature Database
White-box Membership Attack Against Machine Learning Based Retinopathy Classification Authors: Mounia Hamidouche, Reda Bellafqira, Gwenolé Quellec, Gouenou Coatrieux | Published: 2022-05-30 Attack Methods against DFLAdversarial Attack Methods 2022.05.30 2025.05.28 Literature Database
Evaluating Automated Driving Planner Robustness against Adversarial Influence Authors: Andres Molina-Markham, Silvia G. Ionescu, Erin Lanus, Derek Ng, Sam Sommerer, Joseph J. Rushanan | Published: 2022-05-29 Cyber ThreatTrust EvaluationVehicle Network 2022.05.29 2025.05.28 Literature Database