A Robust Phased Elimination Algorithm for Corruption-Tolerant Gaussian Process Bandits Authors: Ilija Bogunovic, Zihan Li, Andreas Krause, Jonathan Scarlett | Published: 2022-02-03 | Updated: 2022-03-28 2022.02.03 2025.05.28 Literature Database
Byzantine-Robust Decentralized Learning via ClippedGossip Authors: Lie He, Sai Praneeth Karimireddy, Martin Jaggi | Published: 2022-02-03 | Updated: 2023-04-20 2022.02.03 2025.05.28 Literature Database
Parameters or Privacy: A Provable Tradeoff Between Overparameterization and Membership Inference Authors: Jasper Tan, Blake Mason, Hamid Javadi, Richard G. Baraniuk | Published: 2022-02-02 | Updated: 2022-11-30 2022.02.02 2025.05.28 Literature Database
Unsupervised Network Intrusion Detection System for AVTP in Automotive Ethernet Networks Authors: Natasha Alkhatib, Maria Mushtaq, Hadi Ghauch, Jean-Luc Danger | Published: 2022-01-31 | Updated: 2022-04-25 2022.01.31 2025.05.28 Literature Database
Cryptocurrency Valuation: An Explainable AI Approach Authors: Yulin Liu, Luyao Zhang | Published: 2022-01-30 | Updated: 2023-07-08 2022.01.30 2025.05.28 Literature Database
Transfer Learning In Differential Privacy’s Hybrid-Model Authors: Refael Kohen, Or Sheffet | Published: 2022-01-28 | Updated: 2022-06-16 2022.01.28 2025.05.28 Literature Database
SSLGuard: A Watermarking Scheme for Self-supervised Learning Pre-trained Encoders Authors: Tianshuo Cong, Xinlei He, Yang Zhang | Published: 2022-01-27 | Updated: 2022-08-31 2022.01.27 2025.05.28 Literature Database
An Overview of Compressible and Learnable Image Transformation with Secret Key and Its Applications Authors: Hitoshi Kiya, AprilPyone MaungMaung, Yuma Kinoshita, Shoko Imaizumi, Sayaka Shiota | Published: 2022-01-26 | Updated: 2022-04-16 2022.01.26 2025.05.28 Literature Database
Reconstructing Training Data with Informed Adversaries Authors: Borja Balle, Giovanni Cherubin, Jamie Hayes | Published: 2022-01-13 | Updated: 2022-04-25 2022.01.13 2025.05.28 Literature Database
Security for Machine Learning-based Software Systems: a survey of threats, practices and challenges Authors: Huaming Chen, M. Ali Babar | Published: 2022-01-12 | Updated: 2023-12-17 2022.01.12 2025.05.28 Literature Database