Literature Database

Network Cascade Vulnerability using Constrained Bayesian Optimization

Authors: Albert Lam, Mihai Anitescu, Anirudh Subramanyam | Published: 2023-04-27 | Updated: 2023-10-05
Cyber Attack
Hyperparameter Tuning
Attack Method

Killing Two Birds with One Stone: Quantization Achieves Privacy in Distributed Learning

Authors: Guangfeng Yan, Tan Li, Kui Wu, Linqi Song | Published: 2023-04-26
DNN IP Protection Method
Training Protocol
Privacy Technique

Blockchain-based Federated Learning with SMPC Model Verification Against Poisoning Attack for Healthcare Systems

Authors: Aditya Pribadi Kalapaaking, Ibrahim Khalil, Xun Yi | Published: 2023-04-26
Privacy Technique
Blockchain Integration
Multi-Party Computation

Measuring and Modeling the Free Content Web

Authors: Abdulrahman Alabduljabbar, Runyu Ma, Ahmed Abusnaina, Rhongho Jang, Songqing Chen, DaeHun Nyang, and David Mohaisen | Published: 2023-04-26
Website Vulnerability
Security Analysis
Vulnerability Analysis

C2PI: An Efficient Crypto-Clear Two-Party Neural Network Private Inference

Authors: Yuke Zhang, Dake Chen, Souvik Kundu, Haomei Liu, Ruiheng Peng, Peter A. Beerel | Published: 2023-04-26
DNN IP Protection Method
Watermarking
Privacy Assessment

Analyzing In-browser Cryptojacking

Authors: Muhammad Saad, David Mohaisen | Published: 2023-04-26
Resource Consumption Analysis
Cryptocurrency Mining
Static Analysis

A Security Verification Framework of Cryptographic Protocols Using Machine Learning

Authors: Kentaro Ohno, Misato Nakabayashi | Published: 2023-04-26
Security Analysis
Training Protocol
Prototype Network

(Local) Differential Privacy has NO Disparate Impact on Fairness

Authors: Héber H. Arcolezi, Karima Makhlouf, Catuscia Palamidessi | Published: 2023-04-25 | Updated: 2023-08-01
Privacy Assessment
Fairness evaluation
Optimization Methods

Improving Robustness Against Adversarial Attacks with Deeply Quantized Neural Networks

Authors: Ferheen Ayaz, Idris Zakariyya, José Cano, Sye Loong Keoh, Jeremy Singer, Danilo Pau, Mounia Kharbouche-Harrari | Published: 2023-04-25
Robustness Evaluation
Adversarial Example
Quantization and Privacy

Blockchain Large Language Models

Authors: Yu Gai, Liyi Zhou, Kaihua Qin, Dawn Song, Arthur Gervais | Published: 2023-04-25 | Updated: 2023-04-29
Membership Inference
Intrusion Detection System
Anomaly Detection Method