Reliable learning in challenging environments Authors: Maria-Florina Balcan, Steve Hanneke, Rattana Pukdee, Dravyansh Sharma | Published: 2023-04-06 | Updated: 2023-10-29 RobustnessOptimization ProblemFunding 2023.04.06 2025.05.28 Literature Database
Inductive Graph Unlearning Authors: Cheng-Long Wang, Mengdi Huai, Di Wang | Published: 2023-04-06 | Updated: 2023-04-07 Graph Neural NetworkClustering methodsExperimental Validation 2023.04.06 2025.05.28 Literature Database
IoT Federated Blockchain Learning at the Edge Authors: James Calo, Benny Lo | Published: 2023-04-06 Cloud ComputingThreats of Medical AIMachine Learning Technology 2023.04.06 2025.05.28 Literature Database
When approximate design for fast homomorphic computation provides differential privacy guarantees Authors: Arnaud Grivet Sébert, Martin Zuber, Oana Stan, Renaud Sirdey, Cédric Gouy-Pailler | Published: 2023-04-06 WatermarkingPrivacy Enhancing TechnologyMachine Learning Method 2023.04.06 2025.05.28 Literature Database
Advanced Security Threat Modelling for Blockchain-Based FinTech Applications Authors: Serhan W. Bahar | Published: 2023-04-05 Security AnalysisThreat modelingVulnerability Mitigation Technique 2023.04.05 2025.05.28 Literature Database
Rethinking the Trigger-injecting Position in Graph Backdoor Attack Authors: Jing Xu, Gorka Abad, Stjepan Picek | Published: 2023-04-05 | Updated: 2023-04-18 Graph Neural NetworkBackdoor AttackFeature Selection Method 2023.04.05 2025.05.28 Literature Database
Side Channel-Assisted Inference Leakage from Machine Learning-based ECG Classification Authors: Jialin Liu, Ning Miao, Chongzhou Fang, Houman Homayoun, Han Wang | Published: 2023-04-04 Cyber AttackPrivacy Enhancing TechnologyAttack Method 2023.04.04 2025.05.28 Literature Database
Leveraging Deep Learning Approaches for Deepfake Detection: A Review Authors: Aniruddha Tiwari, Rushit Dave, Mounika Vanamala | Published: 2023-04-04 WatermarkingModel SelectionMachine Learning Method 2023.04.04 2025.05.28 Literature Database
A Multiagent CyberBattleSim for RL Cyber Operation Agents Authors: Thomas Kunz, Christian Fisher, James La Novara-Gsell, Christopher Nguyen, Li Li | Published: 2023-04-03 Security AnalysisNetwork Threat DetectionEducational CTF 2023.04.03 2025.05.28 Literature Database
On Mitigating the Utility-Loss in Differentially Private Learning: A new Perspective by a Geometrically Inspired Kernel Approach Authors: Mohit Kumar, Bernhard A. Moser, Lukas Fischer | Published: 2023-04-03 | Updated: 2024-02-07 Privacy Enhancing TechnologyMachine Learning MethodRegularization 2023.04.03 2025.05.28 Literature Database