Literature Database

Suppressing Poisoning Attacks on Federated Learning for Medical Imaging

Authors: Naif Alkhunaizi, Dmitry Kamzolov, Martin Takáč, Karthik Nandakumar | Published: 2022-07-15
Byzantine Resilience
Poisoning Attack
Computational Efficiency

Smooth Anonymity for Sparse Graphs

Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14
Algorithm Design
Dataset evaluation
Privacy Protection Method

Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities

Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale | Published: 2022-07-13
Model Performance Evaluation
Intrusion Detection System
Transparency and Verification

A Personalised User Authentication System based on EEG Signals

Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14
Algorithm Design
Data Selection Strategy
Model Performance Evaluation

Game of Trojans: A Submodular Byzantine Approach

Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-07-13
Algorithm Design
Model Performance Evaluation
Strategic Game

dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation

Authors: Sofiane Mahiou, Kai Xu, Georgi Ganev | Published: 2022-07-12
Algorithm Design
Privacy Protection
Privacy Enhancing Technology

RelaxLoss: Defending Membership Inference Attacks without Losing Utility

Authors: Dingfan Chen, Ning Yu, Mario Fritz | Published: 2022-07-12
Membership Inference
Model Performance Evaluation
Loss Term

Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware

Authors: Luca Demetrio, Battista Biggio, Fabio Roli | Published: 2022-07-12
Attack Methods against DFL
Poisoning
Malware Propagation Means

Federated Unlearning: How to Efficiently Erase a Client in FL?

Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo | Published: 2022-07-12 | Updated: 2023-10-20
Client Data Deletion
Backdoor Attack
Model Performance Evaluation

Efficient and Privacy Preserving Group Signature for Federated Learning

Authors: Sneha Kanchan, Jae Won Jang, Jun Yong Yoon, Bong Jun Choi | Published: 2022-07-12 | Updated: 2022-07-15
Group Signature
Poisoning
Communication Efficiency