Distribution inference risks: Identifying and mitigating sources of leakage Authors: Valentin Hartmann, Léo Meynent, Maxime Peyrard, Dimitrios Dimitriadis, Shruti Tople, Robert West | Published: 2022-09-18 Data LeakageMembership InferenceCauses of Information Leakage 2022.09.18 2025.05.28 Literature Database
Hierarchical fuzzy neural networks with privacy preservation for heterogeneous big data Authors: Leijie Zhang, Ye Shi, Yu-Cheng Chang, Chin-Teng Lin | Published: 2022-09-18 AlgorithmModel ArchitectureHierarchical Classification Methods 2022.09.18 2025.05.28 Literature Database
Characterizing Internal Evasion Attacks in Federated Learning Authors: Taejin Kim, Shubhranshu Singh, Nikhil Madaan, Carlee Joe-Wong | Published: 2022-09-17 | Updated: 2023-10-21 PoisoningAdversarial attackAdaptive Adversarial Training 2022.09.17 2025.05.28 Literature Database
A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique Authors: Abdur Rehman, Sagheer Abbas, M. A. Khan, Taher M. Ghazal, Khan Muhammad Adnan, Amir Mosavi | Published: 2022-09-16 Blockchain TechnologyModel Performance EvaluationMedical Monitoring System 2022.09.16 2025.05.28 Literature Database
IoT Data Analytics in Dynamic Environments: From An Automated Machine Learning Perspective Authors: Li Yang, Abdallah Shami | Published: 2022-09-16 IoT Data Analysis TaskAlgorithmImprovement of Learning 2022.09.16 2025.05.28 Literature Database
Dataset Inference for Self-Supervised Models Authors: Adam Dziedzic, Haonan Duan, Muhammad Ahmad Kaleem, Nikita Dhawan, Jonas Guan, Yannis Cattan, Franziska Boenisch, Nicolas Papernot | Published: 2022-09-16 | Updated: 2023-01-13 PoisoningMembership InferenceModel Extraction Attack 2022.09.16 2025.05.28 Literature Database
Privacy-Preserving Distributed Expectation Maximization for Gaussian Mixture Model using Subspace Perturbation Authors: Qiongxiu Li, Jaron Skovsted Gundersen, Katrine Tjell, Rafal Wisniewski, Mads Græsbøll Christensen | Published: 2022-09-16 Privacy AnalysisModel DesignMulti-Party Computation 2022.09.16 2025.05.28 Literature Database
M^4I: Multi-modal Models Membership Inference Authors: Pingyi Hu, Zihan Wang, Ruoxi Sun, Hu Wang, Minhui Xue | Published: 2022-09-15 Privacy AnalysisModel DesignDeep Learning Method 2022.09.15 2025.05.28 Literature Database
Robust Transferable Feature Extractors: Learning to Defend Pre-Trained Networks Against White Box Adversaries Authors: Alexander Cann, Ian Colbert, Ihab Amer | Published: 2022-09-14 Model DesignAdversarial Attack DetectionDeep Learning Method 2022.09.14 2025.05.28 Literature Database
Data Privacy and Trustworthy Machine Learning Authors: Martin Strobel, Reza Shokri | Published: 2022-09-14 Bias Mitigation TechniquesPrivacy Risk ManagementMembership Inference 2022.09.14 2025.05.28 Literature Database