LCCDE: A Decision-Based Ensemble Framework for Intrusion Detection in The Internet of Vehicles Authors: Li Yang, Abdallah Shami, Gary Stevens, Stephen De Rusett | Published: 2022-08-05 | Updated: 2022-09-01 2022.08.05 2025.05.28 Literature Database
Federated Learning for Medical Applications: A Taxonomy, Current Trends, Challenges, and Future Research Directions Authors: Ashish Rauniyar, Desta Haileselassie Hagos, Debesh Jha, Jan Erik Håkegård, Ulas Bagci, Danda B. Rawat, Vladimir Vlassov | Published: 2022-08-05 | Updated: 2023-10-29 2022.08.05 2025.05.28 Literature Database
Lethal Dose Conjecture on Data Poisoning Authors: Wenxiao Wang, Alexander Levine, Soheil Feizi | Published: 2022-08-05 | Updated: 2022-10-18 2022.08.05 2025.05.28 Literature Database
On False Data Injection Attack against Building Automation Systems Authors: Michael Cash, Christopher Morales-Gonzalez, Shan Wang, Xipeng Jin, Alex Parlato, Jason Zhu, Qun Zhou Sun, Xinwen Fu | Published: 2022-08-04 | Updated: 2022-09-25 2022.08.04 2025.05.28 Literature Database
Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption Authors: Syed Imtiaz Ahamed, Vadlamani Ravi | Published: 2022-08-04 2022.08.04 2025.05.28 Literature Database
Node Copying: A Random Graph Model for Effective Graph Sampling Authors: Florence Regol, Soumyasundar Pal, Jianing Sun, Yingxue Zhang, Yanhui Geng, Mark Coates | Published: 2022-08-04 2022.08.04 2025.05.28 Literature Database
Design of secure and robust cognitive system for malware detection Authors: Sanket Shukla | Published: 2022-08-03 2022.08.03 2025.05.28 Literature Database
How Much Privacy Does Federated Learning with Secure Aggregation Guarantee? Authors: Ahmed Roushdy Elkordy, Jiang Zhang, Yahya H. Ezzeldin, Konstantinos Psounis, Salman Avestimehr | Published: 2022-08-03 2022.08.03 2025.05.28 Literature Database
A New Implementation of Federated Learning for Privacy and Security Enhancement Authors: Xiang Ma, Haijian Sun, Rose Qingyang Hu, Yi Qian | Published: 2022-08-03 2022.08.03 2025.05.28 Literature Database
On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel Authors: Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra | Published: 2022-08-01 | Updated: 2024-02-17 2022.08.01 2025.05.28 Literature Database