Gradient Sparsification for Efficient Wireless Federated Learning with Differential Privacy

Authors: Kang Wei, Jun Li, Chuan Ma, Ming Ding, Feng Shu, Haitao Zhao, Wen Chen, Hongbo Zhu | Published: 2023-04-09 | Updated: 2023-12-21

KeyDetect –Detection of anomalies and user based on Keystroke Dynamics

Authors: Soumyatattwa Kar, Abhishek Bamotra, Bhavya Duvvuri, Radhika Mohanan | Published: 2023-04-08

Feature Mining for Encrypted Malicious Traffic Detection with Deep Learning and Other Machine Learning Algorithms

Authors: Zihao Wang, Vrizlynn L. L. Thing | Published: 2023-04-07

SCART: Simulation of Cyber Attacks for Real-Time

Authors: Kfir Girstein, Eliron Rahimi, Avi Mendelson | Published: 2023-04-07

AI Model Disgorgement: Methods and Choices

Authors: Alessandro Achille, Michael Kearns, Carson Klingenberg, Stefano Soatto | Published: 2023-04-07

Does Prompt-Tuning Language Model Ensure Privacy?

Authors: Shangyu Xie, Wei Dai, Esha Ghosh, Sambuddha Roy, Dan Schwartz, Kim Laine | Published: 2023-04-07 | Updated: 2023-04-15

Reliable learning in challenging environments

Authors: Maria-Florina Balcan, Steve Hanneke, Rattana Pukdee, Dravyansh Sharma | Published: 2023-04-06 | Updated: 2023-10-29

Inductive Graph Unlearning

Authors: Cheng-Long Wang, Mengdi Huai, Di Wang | Published: 2023-04-06 | Updated: 2023-04-07

IoT Federated Blockchain Learning at the Edge

Authors: James Calo, Benny Lo | Published: 2023-04-06

When approximate design for fast homomorphic computation provides differential privacy guarantees

Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler | Published: 2023-04-06