Reputation-based PoS for the Restriction of Illicit Activities on Blockchain: Algorand Usecase

Authors: Mayank Pandey, Rachit Agarwal, Sandeep Kumar Shukla, Nishchal Kumar Verma | Published: 2021-12-21 | Updated: 2022-08-25

A Theoretical View of Linear Backpropagation and Its Convergence

Authors: Ziang Li, Yiwen Guo, Haodi Liu, Changshui Zhang | Published: 2021-12-21 | Updated: 2024-01-10

Vulnerability Analysis of the Android Kernel

Authors: Joseph R. Barr, Peter Shaw, Tyler Thatcher | Published: 2021-12-20

Robust and Privacy-Preserving Collaborative Learning: A Comprehensive Survey

Authors: Shangwei Guo, Xu Zhang, Fei Yang, Tianwei Zhang, Yan Gan, Tao Xiang, Yang Liu | Published: 2021-12-19

ML Supported Predictions for SAT Solvers Performance

Authors: A. -M. Leventi-Peetz, Jörg-Volker Peetz, Martina Rohde | Published: 2021-12-17

Deep Bayesian Learning for Car Hacking Detection

Authors: Laha Ale, Scott A. King, Ning Zhang | Published: 2021-12-17

Robust Upper Bounds for Adversarial Training

Authors: Dimitris Bertsimas, Xavier Boix, Kimberly Villalobos Carballo, Dick den Hertog | Published: 2021-12-17 | Updated: 2023-04-06

Addressing Adversarial Machine Learning Attacks in Smart Healthcare Perspectives

Authors: Arawinkumaar Selvakkumar, Shantanu Pal, Zahra Jadidi | Published: 2021-12-16

Model Stealing Attacks Against Inductive Graph Neural Networks

Authors: Yun Shen, Xinlei He, Yufei Han, Yang Zhang | Published: 2021-12-15

Few-shot Instruction Prompts for Pretrained Language Models to Detect Social Biases

Authors: Shrimai Prabhumoye, Rafal Kocielnik, Mohammad Shoeybi, Anima Anandkumar, Bryan Catanzaro | Published: 2021-12-15 | Updated: 2022-04-15