Overparameterization from Computational Constraints Authors: Sanjam Garg, Somesh Jha, Saeed Mahloujifar, Mohammad Mahmoody, Mingyuan Wang | Published: 2022-08-27 | Updated: 2022-10-15 Verification of Digital SignaturesMachine Learning TechnologyFunction Definition 2022.08.27 2025.05.28 Literature Database
Federated and Privacy-Preserving Learning of Accounting Data in Financial Statement Audits Authors: Marco Schreyer, Timur Sattarov, Damian Borth | Published: 2022-08-26 Privacy Protection MethodFrameworkExperimental Validation 2022.08.26 2025.05.28 Literature Database
I still know it’s you! On Challenges in Anonymizing Source Code Authors: Micha Horlboge, Erwin Quiring, Roland Meyer, Konrad Rieck | Published: 2022-08-26 | Updated: 2024-04-10 Code AnonymityPrivacy Protection MethodUncertainty Assessment 2022.08.26 2025.05.28 Literature Database
Unraveling Threat Intelligence Through the Lens of Malicious URL Campaigns Authors: Mahathir Almashor, Ejaz Ahmed, Benjamin Pick, Sharif Abuadbba, Jason Xue, Raj Gaire, Shuo Wang, Seyit Camtepe, Surya Nepal | Published: 2022-08-26 Campaign MetricsPhishingMalicious URL Analysis 2022.08.26 2025.05.28 Literature Database
DiVa: An Accelerator for Differentially Private Machine Learning Authors: Beomsik Park, Ranggi Hwang, Dongho Yoon, Yoonhyuk Choi, Minsoo Rhu | Published: 2022-08-26 Model Performance EvaluationEfficiency EvaluationImprovement of Learning 2022.08.26 2025.05.28 Literature Database
COOKIEGRAPH: Understanding and Detecting First-Party Tracking Cookies Authors: Shaoor Munir, Sandra Siby, Umar Iqbal, Steven Englehardt, Zubair Shafiq, Carmela Troncoso | Published: 2022-08-25 | Updated: 2023-11-27 CybersecurityPrivacy ViolationUser Activity Analysis 2022.08.25 2025.05.28 Literature Database
SNAP: Efficient Extraction of Private Properties with Poisoning Authors: Harsh Chaudhari, John Abascal, Alina Oprea, Matthew Jagielski, Florian Tramèr, Jonathan Ullman | Published: 2022-08-25 | Updated: 2023-06-21 Backdoor AttackProperty InferenceAttack Method 2022.08.25 2025.05.28 Literature Database
Automatic Mapping of Unstructured Cyber Threat Intelligence: An Experimental Study Authors: Vittorio Orbinato, Mariarosaria Barbaraci, Roberto Natella, Domenico Cotroneo | Published: 2022-08-25 CybersecurityAttack DetectionMachine Learning 2022.08.25 2025.05.28 Literature Database
Empirical study of Machine Learning Classifier Evaluation Metrics behavior in Massively Imbalanced and Noisy data Authors: Gayan K. Kulatilleke, Sugandika Samarakoon | Published: 2022-08-25 Fraudulent TransactionAnalysis of Detection MethodsMachine Learning 2022.08.25 2025.05.28 Literature Database
Credit card fraud detection – Classifier selection strategy Authors: Gayan K. Kulatilleke | Published: 2022-08-25 Fraudulent TransactionMachine LearningMachine Learning Technology 2022.08.25 2025.05.28 Literature Database