Privacy-Preserving Chaotic Extreme Learning Machine with Fully Homomorphic Encryption Authors: Syed Imtiaz Ahamed, Vadlamani Ravi | Published: 2022-08-04 2022.08.04 2025.05.28 Literature Database
Node Copying: A Random Graph Model for Effective Graph Sampling Authors: Florence Regol, Soumyasundar Pal, Jianing Sun, Yingxue Zhang, Yanhui Geng, Mark Coates | Published: 2022-08-04 2022.08.04 2025.05.28 Literature Database
Design of secure and robust cognitive system for malware detection Authors: Sanket Shukla | Published: 2022-08-03 2022.08.03 2025.05.28 Literature Database
How Much Privacy Does Federated Learning with Secure Aggregation Guarantee? Authors: Ahmed Roushdy Elkordy, Jiang Zhang, Yahya H. Ezzeldin, Konstantinos Psounis, Salman Avestimehr | Published: 2022-08-03 2022.08.03 2025.05.28 Literature Database
A New Implementation of Federated Learning for Privacy and Security Enhancement Authors: Xiang Ma, Haijian Sun, Rose Qingyang Hu, Yi Qian | Published: 2022-08-03 2022.08.03 2025.05.28 Literature Database
On the Evaluation of User Privacy in Deep Neural Networks using Timing Side Channel Authors: Shubhi Shukla, Manaar Alam, Sarani Bhattacharya, Debdeep Mukhopadhyay, Pabitra Mitra | Published: 2022-08-01 | Updated: 2024-02-17 2022.08.01 2025.05.28 Literature Database
DNNShield: Dynamic Randomized Model Sparsification, A Defense Against Adversarial Machine Learning Authors: Mohammad Hossein Samavatian, Saikat Majumdar, Kristin Barber, Radu Teodorescu | Published: 2022-07-31 2022.07.31 2025.05.28 Literature Database
Verifiable Encodings for Secure Homomorphic Analytics Authors: Sylvain Chatel, Christian Knabenhans, Apostolos Pyrgelis, Carmela Troncoso, Jean-Pierre Hubaux | Published: 2022-07-28 | Updated: 2024-06-04 2022.07.28 2025.05.28 Literature Database
Gotham Testbed: a Reproducible IoT Testbed for Security Experiments and Dataset Generation Authors: Xabier Sáez-de-Cámara, Jose Luis Flores, Cristóbal Arellano, Aitor Urbieta, Urko Zurutuza | Published: 2022-07-28 | Updated: 2023-07-27 2022.07.28 2025.05.28 Literature Database
Continuous User Authentication Using Machine Learning and Multi-Finger Mobile Touch Dynamics with a Novel Dataset Authors: Zachary Deridder, Nyle Siddiqui, Thomas Reither, Rushit Dave, Brendan Pelto, Naeem Seliya, Mounika Vanamala | Published: 2022-07-27 2022.07.27 2025.05.28 Literature Database