Mitigating Sybil Attacks on Differential Privacy based Federated Learning Authors: Yupeng Jiang, Yong Li, Yipeng Zhou, Xi Zheng | Published: 2020-10-20 2020.10.20 2025.05.28 Literature Database
Tight Second-Order Certificates for Randomized Smoothing Authors: Alexander Levine, Aounon Kumar, Thomas Goldstein, Soheil Feizi | Published: 2020-10-20 | Updated: 2020-12-15 2020.10.20 2025.05.28 Literature Database
Image Obfuscation for Privacy-Preserving Machine Learning Authors: Mathilde Raynal, Radhakrishna Achanta, Mathias Humbert | Published: 2020-10-20 2020.10.20 2025.05.28 Literature Database
A Survey of Machine Learning Techniques in Adversarial Image Forensics Authors: Ehsan Nowroozi, Ali Dehghantanha, Reza M. Parizi, Kim-Kwang Raymond Choo | Published: 2020-10-19 2020.10.19 2025.05.28 Literature Database
Against All Odds: Winning the Defense Challenge in an Evasion Competition with Diversification Authors: Erwin Quiring, Lukas Pirch, Michael Reimsbach, Daniel Arp, Konrad Rieck | Published: 2020-10-19 2020.10.19 2025.05.28 Literature Database
Dos and Don’ts of Machine Learning in Computer Security Authors: Daniel Arp, Erwin Quiring, Feargus Pendlebury, Alexander Warnecke, Fabio Pierazzi, Christian Wressnegger, Lorenzo Cavallaro, Konrad Rieck | Published: 2020-10-19 | Updated: 2021-11-30 2020.10.19 2025.05.28 Literature Database
Privacy-preserving Data Sharing on Vertically Partitioned Data Authors: Razane Tajeddine, Joonas Jälkö, Samuel Kaski, Antti Honkela | Published: 2020-10-19 | Updated: 2022-09-02 2020.10.19 2025.05.28 Literature Database
Taking Over the Stock Market: Adversarial Perturbations Against Algorithmic Traders Authors: Elior Nehemya, Yael Mathov, Asaf Shabtai, Yuval Elovici | Published: 2020-10-19 | Updated: 2021-09-02 2020.10.19 2025.05.28 Literature Database
Enabling Fast Differentially Private SGD via Just-in-Time Compilation and Vectorization Authors: Pranav Subramani, Nicholas Vadivelu, Gautam Kamath | Published: 2020-10-18 | Updated: 2021-10-26 2020.10.18 2025.05.28 Literature Database
GOAT: GPU Outsourcing of Deep Learning Training With Asynchronous Probabilistic Integrity Verification Inside Trusted Execution Environment Authors: Aref Asvadishirehjini, Murat Kantarcioglu, Bradley Malin | Published: 2020-10-17 2020.10.17 2025.05.28 Literature Database