Literature Database

Demystifying Quantum Blockchain for Healthcare

Authors: Keshav Kaushik, Adarsh Kumar | Published: 2022-10-07
Smart Healthcare
Quantum Blockchain Technology
Quantum Machine Learning

1st ICLR International Workshop on Privacy, Accountability, Interpretability, Robustness, Reasoning on Structured Data (PAIR^2Struct)

Authors: Hao Wang, Wanyu Lin, Hao He, Di Wang, Chengzhi Mao, Muhan Zhang | Published: 2022-10-07
Privacy Assessment
Causal Interpretation
Promotion of Diversity

Empowering Graph Representation Learning with Test-Time Graph Transformation

Authors: Wei Jin, Tong Zhao, Jiayuan Ding, Yozen Liu, Jiliang Tang, Neil Shah | Published: 2022-10-07 | Updated: 2023-02-26
Framework
Model Design
Feature Selection Method

mPSAuth: Privacy-Preserving and Scalable Authentication for Mobile Web Applications

Authors: David Monschein, Oliver P. Waldhorst | Published: 2022-10-07
Privacy Enhancing Technology
User Behavior Analysis
Threat Model

Preprocessors Matter! Realistic Decision-Based Attacks on Machine Learning Systems

Authors: Chawin Sitawarin, Florian Tramèr, Nicholas Carlini | Published: 2022-10-07 | Updated: 2023-07-20
DNN IP Protection Method
Model Extraction Attack
Adversarial Example

Network Intrusion Detection System in a Light Bulb

Authors: Liam Daly Manocchio, Siamak Layeghy, Marius Portmann | Published: 2022-10-06
IoT Security Risks
Model Design
Decision Tree

Federated Boosted Decision Trees with Differential Privacy

Authors: Samuel Maddock, Graham Cormode, Tianhao Wang, Carsten Maple, Somesh Jha | Published: 2022-10-06
Privacy Protection Method
Decision Tree
Weight Update Method

Deep Reinforcement Learning based Evasion Generative Adversarial Network for Botnet Detection

Authors: Rizwan Hamid Randhawa, Nauman Aslam, Mohammad Alauthman, Muhammad Khalid, Husnain Rafiq | Published: 2022-10-06
Data Generation
Reinforcement Learning
Deep Learning Method

DReS-FL: Dropout-Resilient Secure Federated Learning for Non-IID Clients via Secret Data Sharing

Authors: Jiawei Shao, Yuchang Sun, Songze Li, Jun Zhang | Published: 2022-10-06
Privacy Protection Method
Framework
Poisoning

A Closer Look at Robustness to L-infinity and Spatial Perturbations and their Composition

Authors: Luke Rowe, Benjamin Thérien, Krzysztof Czarnecki, Hongyang Zhang | Published: 2022-10-05
DNN IP Protection Method
Model Design
Deep Learning Method