CryptoRec: Privacy-preserving Recommendation as a Service Authors: Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan | Published: 2018-02-07 | Updated: 2018-05-13 Privacy Protection MechanismDifferential PrivacyMachine Learning Method 2018.02.07 2025.05.13 Literature Database
ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks Authors: Tsung-Ting Kuo, Lucila Ohno-Machado | Published: 2018-02-06 Privacy Protection MechanismBlockchain IntegrationMachine Learning Method 2018.02.06 2025.05.13 Literature Database
Blind Pre-Processing: A Robust Defense Method Against Adversarial Examples Authors: Adnan Siraj Rakin, Zhezhi He, Boqing Gong, Deliang Fan | Published: 2018-02-05 | Updated: 2018-02-07 Data PreprocessingCertified RobustnessAdversarial Learning 2018.02.05 2025.05.13 Literature Database
IntelliAV: Building an Effective On-Device Android Malware Detector Authors: Mansour Ahmadi, Angelo Sotgiu, Giorgio Giacinto | Published: 2018-02-04 Risk AssessmentMachine Learning MethodFeature Extraction 2018.02.04 2025.05.13 Literature Database
Secure Range Queries for Multiple Users Authors: Anselme Tueno, Florian Kerschbaum | Published: 2018-02-04 Privacy-Preserving AlgorithmPrivacy Protection MechanismSecure Arithmetic Computation 2018.02.04 2025.05.13 Literature Database
Evaluating the Robustness of Neural Networks: An Extreme Value Theory Approach Authors: Tsui-Wei Weng, Huan Zhang, Pin-Yu Chen, Jinfeng Yi, Dong Su, Yupeng Gao, Cho-Jui Hsieh, Luca Daniel | Published: 2018-01-31 Certified RobustnessRobustness EvaluationAdversarial attack 2018.01.31 2025.05.13 Literature Database
PrivPy: Enabling Scalable and General Privacy-Preserving Machine Learning Authors: Yi Li, Yitao Duan, Yu Yu, Shuoyao Zhao, Wei Xu | Published: 2018-01-30 | Updated: 2020-04-21 Privacy-Preserving AlgorithmPrivacy Protection MechanismSecure Arithmetic Computation 2018.01.30 2025.05.13 Literature Database
Learning to Evade Static PE Machine Learning Malware Models via Reinforcement Learning Authors: Hyrum S. Anderson, Anant Kharkar, Bobby Filar, David Evans, Phil Roth | Published: 2018-01-26 | Updated: 2018-01-30 Reinforcement Learning MethodAdversarial attackMachine Learning Method 2018.01.26 2025.05.13 Literature Database
Forecasting Suspicious Account Activity at Large-Scale Online Service Providers Authors: Hassan Halawa, Matei Ripeanu, Konstantin Beznosov, Baris Coskun, Meizhu Liu | Published: 2018-01-25 Model EvaluationUser Behavior AnalysisRisk Assessment 2018.01.25 2025.05.13 Literature Database
Secure $k$-ish Nearest Neighbors Classifier Authors: Hayim Shaul, Dan Feldman, Daniela Rus | Published: 2018-01-22 | Updated: 2019-04-30 Secure Arithmetic ComputationMachine Learning MethodWatermarking Technology 2018.01.22 2025.05.13 Literature Database