Suppressing Poisoning Attacks on Federated Learning for Medical Imaging Authors: Naif Alkhunaizi, Dmitry Kamzolov, Martin Takáč, Karthik Nandakumar | Published: 2022-07-15 Byzantine ResiliencePoisoning AttackComputational Efficiency 2022.07.15 2025.05.28 Literature Database
Smooth Anonymity for Sparse Graphs Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14 Algorithm DesignDataset evaluationPrivacy Protection Method 2022.07.13 2025.05.28 Literature Database
Explainable Intrusion Detection Systems (X-IDS): A Survey of Current Methods, Challenges, and Opportunities Authors: Subash Neupane, Jesse Ables, William Anderson, Sudip Mittal, Shahram Rahimi, Ioana Banicescu, Maria Seale | Published: 2022-07-13 Model Performance EvaluationIntrusion Detection SystemTransparency and Verification 2022.07.13 2025.05.28 Literature Database
A Personalised User Authentication System based on EEG Signals Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14 Algorithm DesignData Selection StrategyModel Performance Evaluation 2022.07.13 2025.05.28 Literature Database
Game of Trojans: A Submodular Byzantine Approach Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-07-13 Algorithm DesignModel Performance EvaluationStrategic Game 2022.07.13 2025.05.28 Literature Database
dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation Authors: Sofiane Mahiou, Kai Xu, Georgi Ganev | Published: 2022-07-12 Algorithm DesignPrivacy ProtectionPrivacy Enhancing Technology 2022.07.12 2025.05.28 Literature Database
RelaxLoss: Defending Membership Inference Attacks without Losing Utility Authors: Dingfan Chen, Ning Yu, Mario Fritz | Published: 2022-07-12 Membership InferenceModel Performance EvaluationLoss Term 2022.07.12 2025.05.28 Literature Database
Practical Attacks on Machine Learning: A Case Study on Adversarial Windows Malware Authors: Luca Demetrio, Battista Biggio, Fabio Roli | Published: 2022-07-12 Attack Methods against DFLPoisoningMalware Propagation Means 2022.07.12 2025.05.28 Literature Database
Federated Unlearning: How to Efficiently Erase a Client in FL? Authors: Anisa Halimi, Swanand Kadhe, Ambrish Rawat, Nathalie Baracaldo | Published: 2022-07-12 | Updated: 2023-10-20 Client Data DeletionBackdoor AttackModel Performance Evaluation 2022.07.12 2025.05.28 Literature Database
Efficient and Privacy Preserving Group Signature for Federated Learning Authors: Sneha Kanchan, Jae Won Jang, Jun Yong Yoon, Bong Jun Choi | Published: 2022-07-12 | Updated: 2022-07-15 Group SignaturePoisoningCommunication Efficiency 2022.07.12 2025.05.28 Literature Database