Differentially Private One Permutation Hashing and Bin-wise Consistent Weighted Sampling Authors: Xiaoyun Li, Ping Li | Published: 2023-06-13 Data Privacy AssessmentData Protection MethodPrivacy Technique 2023.06.13 2025.05.28 Literature Database
SRATTA : Sample Re-ATTribution Attack of Secure Aggregation in Federated Learning Authors: Tanguy Marchand, Régis Loeb, Ulysse Marteau-Ferey, Jean Ogier du Terrail, Arthur Pignet | Published: 2023-06-13 PoisoningMalicious ClientFederated Learning 2023.06.13 2025.05.28 Literature Database
Intrusion Detection: A Deep Learning Approach Authors: Ishaan Shivhare, Joy Purohit, Vinay Jogani, Samina Attari, Madhav Chandane | Published: 2023-06-13 LSTM Model Performance EvaluationClassification Pattern AnalysisAutomated Intrusion Detection System 2023.06.13 2025.05.28 Literature Database
“Private Prediction Strikes Back!” Private Kernelized Nearest Neighbors with Individual Renyi Filter Authors: Yuqing Zhu, Xuandong Zhao, Chuan Guo, Yu-Xiang Wang | Published: 2023-06-12 Data Privacy AssessmentHyperparameter TuningPrivacy Technique 2023.06.12 2025.05.28 Literature Database
Gaussian Membership Inference Privacy Authors: Tobias Leemann, Martin Pawelczyk, Gjergji Kasneci | Published: 2023-06-12 | Updated: 2023-10-26 Privacy TechniqueHypothesis TestingStatistical Testing 2023.06.12 2025.05.28 Literature Database
On building machine learning pipelines for Android malware detection: a procedural survey of practices, challenges and opportunities Authors: Masoud Mehrabi Koushki, Ibrahim AbuAlhaol, Anandharaju Durai Raju, Yang Zhou, Ronnie Salvador Giagone, Huang Shengqiang | Published: 2023-06-12 Role of MLSecOpsCybersecurityMalware Detection 2023.06.12 2025.05.28 Literature Database
When Vision Fails: Text Attacks Against ViT and OCR Authors: Nicholas Boucher, Jenny Blessing, Ilia Shumailov, Ross Anderson, Nicolas Papernot | Published: 2023-06-12 Performance EvaluationAttack Pattern ExtractionWatermark Robustness 2023.06.12 2025.05.28 Literature Database
AnoFel: Supporting Anonymity for Privacy-Preserving Federated Learning Authors: Ghada Almashaqbeh, Zahra Ghodsi | Published: 2023-06-12 Privacy TechniqueMalicious ClientFederated Learning 2023.06.12 2025.05.28 Literature Database
Augmenting Greybox Fuzzing with Generative AI Authors: Jie Hu, Qian Zhang, Heng Yin | Published: 2023-06-11 FuzzingPrompt InjectionPerformance Evaluation 2023.06.11 2025.05.28 Literature Database
Efficient Skip Connections Realization for Secure Inference on Encrypted Data Authors: Nir Drucker, Itamar Zimerman | Published: 2023-06-11 Privacy TechniqueReal-Time InferencePerformance Evaluation 2023.06.11 2025.05.28 Literature Database