Protect Federated Learning Against Backdoor Attacks via Data-Free Trigger Generation Authors: Yanxin Yang, Ming Hu, Yue Cao, Jun Xia, Yihao Huang, Yang Liu, Mingsong Chen | Published: 2023-08-22 2023.08.22 2025.05.28 Literature Database
Optimized Deep Learning Models for Malware Detection under Concept Drift Authors: William Maillet, Benjamin Marais | Published: 2023-08-21 | Updated: 2024-08-01 2023.08.21 2025.05.28 Literature Database
A Modular and Adaptive System for Business Email Compromise Detection Authors: Jan Brabec, Filip Šrajer, Radek Starosta, Tomáš Sixta, Marc Dupont, Miloš Lenoch, Jiří Menšík, Florian Becker, Jakub Boros, Tomáš Pop, Pavel Novák | Published: 2023-08-21 2023.08.21 2025.05.28 Literature Database
ALI-DPFL: Differentially Private Federated Learning with Adaptive Local Iterations Authors: Xinpeng Ling, Jie Fu, Kuncan Wang, Haitao Liu, Zhili Chen | Published: 2023-08-21 | Updated: 2024-05-22 2023.08.21 2025.05.28 Literature Database
Federated Learning for Connected and Automated Vehicles: A Survey of Existing Approaches and Challenges Authors: Vishnu Pandi Chellapandi, Liangqi Yuan, Christopher G. Brinton, Stanislaw H Zak, Ziran Wang | Published: 2023-08-21 | Updated: 2023-11-11 2023.08.21 2025.05.28 Literature Database
AutoReP: Automatic ReLU Replacement for Fast Private Network Inference Authors: Hongwu Peng, Shaoyi Huang, Tong Zhou, Yukui Luo, Chenghong Wang, Zigeng Wang, Jiahui Zhao, Xi Xie, Ang Li, Tony Geng, Kaleel Mahmood, Wujie Wen, Xiaolin Xu, Caiwen Ding | Published: 2023-08-20 2023.08.20 2025.05.28 Literature Database
A Comparison of Adversarial Learning Techniques for Malware Detection Authors: Pavla Louthánová, Matouš Kozák, Martin Jureček, Mark Stamp | Published: 2023-08-19 2023.08.19 2025.05.28 Literature Database
DUAW: Data-free Universal Adversarial Watermark against Stable Diffusion Customization Authors: Xiaoyu Ye, Hao Huang, Jiaqi An, Yongtao Wang | Published: 2023-08-19 2023.08.19 2025.05.28 Literature Database
Generative Adversarial Networks Unlearning Authors: Hui Sun, Tianqing Zhu, Wenhan Chang, Wanlei Zhou | Published: 2023-08-19 2023.08.19 2025.05.28 Literature Database
An AI-Driven VM Threat Prediction Model for Multi-Risks Analysis-Based Cloud Cybersecurity Authors: Deepika Saxena, Ishu Gupta, Rishabh Gupta, Ashutosh Kumar Singh, Xiaoqing Wen | Published: 2023-08-18 2023.08.18 2025.05.28 Literature Database