Spam Detection Using BERT Authors: Thaer Sahmoud, Mohammad Mikki | Published: 2022-06-06 | Updated: 2022-06-07 2022.06.06 2025.05.28 Literature Database
Leveraging Machine Learning for Ransomware Detection Authors: Nanda Rani, Sunita Vikrant Dhavale | Published: 2022-06-04 2022.06.04 2025.05.28 Literature Database
A New Security Boundary of Component Differentially Challenged XOR PUFs Against Machine Learning Modeling Attacks Authors: Gaoxiang Li, Khalid T. Mursi, Ahmad O. Aseeri, Mohammed S. Alkatheiri, Yu Zhuang | Published: 2022-06-02 2022.06.02 2025.05.28 Literature Database
Defense Against Gradient Leakage Attacks via Learning to Obscure Data Authors: Yuxuan Wan, Han Xu, Xiaorui Liu, Jie Ren, Wenqi Fan, Jiliang Tang | Published: 2022-06-01 2022.06.01 2025.05.28 Literature Database
Federated Learning in Non-IID Settings Aided by Differentially Private Synthetic Data Authors: Huancheng Chen, Haris Vikalo | Published: 2022-06-01 | Updated: 2023-04-20 2022.06.01 2025.05.28 Literature Database
Differentially Private Shapley Values for Data Evaluation Authors: Lauren Watson, Rayna Andreeva, Hao-Tsung Yang, Rik Sarkar | Published: 2022-06-01 2022.06.01 2025.05.28 Literature Database
Watch Your Back: Identifying Cybercrime Financial Relationships in Bitcoin through Back-and-Forth Exploration Authors: Gibran Gomez, Pedro Moreno-Sanchez, Juan Caballero | Published: 2022-06-01 | Updated: 2022-10-18 2022.06.01 2025.05.28 Literature Database
Privacy for Free: How does Dataset Condensation Help Privacy? Authors: Tian Dong, Bo Zhao, Lingjuan Lyu | Published: 2022-06-01 2022.06.01 2025.05.28 Literature Database
To Collaborate or Not in Distributed Statistical Estimation with Resource Constraints? Authors: Yu-Zhen Janice Chen, Daniel S. Menasche, Don Towsley | Published: 2022-05-31 2022.05.31 2025.05.28 Literature Database
Private Federated Submodel Learning with Sparsification Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-05-31 2022.05.31 2025.05.28 Literature Database