Deep Image: A precious image based deep learning method for online malware detection in IoT Environment

Authors: Meysam Ghahramani, Rahim Taheri, Mohammad Shojafar, Reza Javidan, Shaohua Wan | Published: 2022-04-04

Towards Privacy-Preserving and Verifiable Federated Matrix Factorization

Authors: Xicheng Wan, Yifeng Zheng, Qun Li, Anmin Fu, Mang Su, Yansong Gao | Published: 2022-04-04 | Updated: 2022-06-11

Differentially Private Sampling from Rashomon Sets, and the Universality of Langevin Diffusion for Convex Optimization

Authors: Arun Ganesh, Abhradeep Thakurta, Jalaj Upadhyay | Published: 2022-04-04 | Updated: 2023-08-28

ScaleSFL: A Sharding Solution for Blockchain-Based Federated Learning

Authors: Evan Madill, Ben Nguyen, Carson K. Leung, Sara Rouhani | Published: 2022-04-04

Detecting In-vehicle Intrusion via Semi-supervised Learning-based Convolutional Adversarial Autoencoders

Authors: Thien-Nu Hoang, Daehee Kim | Published: 2022-04-04

Byzantine-Robust Federated Linear Bandits

Authors: Ali Jadbabaie, Haochuan Li, Jian Qian, Yi Tian | Published: 2022-04-03

Breaking the De-Pois Poisoning Defense

Authors: Alaa Anani, Mohamed Ghanem, Lotfy Abdel Khaliq | Published: 2022-04-03

Towards Web Phishing Detection Limitations and Mitigation

Authors: Alsharif Abuadbba, Shuo Wang, Mahathir Almashor, Muhammed Ejaz Ahmed, Raj Gaire, Seyit Camtepe, Surya Nepal | Published: 2022-04-03

Convolutional Neural Networks for Image Spam Detection

Authors: Tazmina Sharmin, Fabio Di Troia, Katerina Potika, Mark Stamp | Published: 2022-04-02

Production of Categorical Data Verifying Differential Privacy: Conception and Applications to Machine Learning

Authors: Héber H. Arcolezi | Published: 2022-04-02