Literature Database

Reliable learning in challenging environments

Authors: Maria-Florina Balcan, Steve Hanneke, Rattana Pukdee, Dravyansh Sharma | Published: 2023-04-06 | Updated: 2023-10-29
Robustness
Optimization Problem
Funding

Inductive Graph Unlearning

Authors: Cheng-Long Wang, Mengdi Huai, Di Wang | Published: 2023-04-06 | Updated: 2023-04-07
Graph Neural Network
Clustering methods
Experimental Validation

IoT Federated Blockchain Learning at the Edge

Authors: James Calo, Benny Lo | Published: 2023-04-06
Cloud Computing
Threats of Medical AI
Machine Learning Technology

When approximate design for fast homomorphic computation provides differential privacy guarantees

Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler | Published: 2023-04-06
Watermarking
Privacy Enhancing Technology
Machine Learning Method

Advanced Security Threat Modelling for Blockchain-Based FinTech Applications

Authors: Serhan W. Bahar | Published: 2023-04-05
Security Analysis
Threat modeling
Vulnerability Mitigation Technique

Rethinking the Trigger-injecting Position in Graph Backdoor Attack

Authors: Jing Xu, Gorka Abad, Stjepan Picek | Published: 2023-04-05 | Updated: 2023-04-18
Graph Neural Network
Backdoor Attack
Feature Selection Method

Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification

Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04
Cyber Attack
Privacy Enhancing Technology
Attack Method

Leveraging Deep Learning Approaches for Deepfake Detection: A Review

Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala | Published: 2023-04-04
Watermarking
Model Selection
Machine Learning Method

A Multiagent CyberBattleSim for RL Cyber Operation Agents

Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03
Security Analysis
Network Threat Detection
Educational CTF

On Mitigating the Utility-Loss in Differentially Private Learning: A new Perspective by a Geometrically Inspired Kernel Approach

Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer | Published: 2023-04-03 | Updated: 2024-02-07
Privacy Enhancing Technology
Machine Learning Method
Regularization