A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets Authors: Irina Arévalo, Jose L. Salmeron | Published: 2024-02-15 2024.02.15 2025.05.12 Literature Database
FedRDF: A Robust and Dynamic Aggregation Function against Poisoning Attacks in Federated Learning Authors: Enrique Mármol Campos, Aurora González Vidal, José Luis Hernández Ramos, Antonio Skarmeta | Published: 2024-02-15 2024.02.15 2025.05.12 Literature Database
How Much Does Each Datapoint Leak Your Privacy? Quantifying the Per-datum Membership Leakage Authors: Achraf Azize, Debabrota Basu | Published: 2024-02-15 2024.02.15 2025.05.12 Literature Database
On the Cross-Dataset Generalization of Machine Learning for Network Intrusion Detection Authors: Marco Cantone, Claudio Marrocco, Alessandro Bria | Published: 2024-02-15 2024.02.15 2025.05.12 Literature Database
Utilizing Deep Learning for Enhancing Network Resilience in Finance Authors: Yulu Gong, Mengran Zhu, Shuning Huo, Yafei Xiang, Hanyi Yu | Published: 2024-02-15 | Updated: 2024-02-18 2024.02.15 2025.05.12 Literature Database
An advanced data fabric architecture leveraging homomorphic encryption and federated learning Authors: Sakib Anwar Rieyan, Md. Raisul Kabir News, A. B. M. Muntasir Rahman, Sadia Afrin Khan, Sultan Tasneem Jawad Zaarif, Md. Golam Rabiul Alam, Mohammad Mehedi Hassan, Michele Ianni, Giancarlo Fortino | Published: 2024-02-15 2024.02.15 2025.05.12 Literature Database
AbuseGPT: Abuse of Generative AI ChatBots to Create Smishing Campaigns Authors: Ashfak Md Shibli, Mir Mehedi A. Pritom, Maanak Gupta | Published: 2024-02-15 2024.02.15 2025.05.12 Literature Database
DPBalance: Efficient and Fair Privacy Budget Scheduling for Federated Learning as a Service Authors: Yu Liu, Zibo Wang, Yifei Zhu, Chen Chen | Published: 2024-02-15 2024.02.15 2025.05.12 Literature Database
PAL: Proxy-Guided Black-Box Attack on Large Language Models Authors: Chawin Sitawarin, Norman Mu, David Wagner, Alexandre Araujo | Published: 2024-02-15 2024.02.15 2025.05.12 Literature Database
Why Does Differential Privacy with Large Epsilon Defend Against Practical Membership Inference Attacks? Authors: Andrew Lowy, Zhuohang Li, Jing Liu, Toshiaki Koike-Akino, Kieran Parsons, Ye Wang | Published: 2024-02-14 2024.02.14 2025.05.12 Literature Database