Literature Database

Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility

Authors: Behrooz Razeghi, Flavio P. Calmon, Deniz Gunduz, Slava Voloshynovskiy | Published: 2022-07-11
Algorithm Design
Information-Theoretic Privacy
Optimization Methods

Statistical Detection of Adversarial examples in Blockchain-based Federated Forest In-vehicle Network Intrusion Detection Systems

Authors: Ibrahim Aliyu, Selinde van Engelenburg, Muhammed Bashir Muazu, Jinsul Kim, Chang Gyoon Lim | Published: 2022-07-11
Poisoning
Attack Type
Adversarial Learning

SALSA: Attacking Lattice Cryptography with Transformers

Authors: Emily Wenger, Mingjie Chen, François Charton, Kristin Lauter | Published: 2022-07-11 | Updated: 2023-04-21
Algorithm Design
Model Design and Accuracy
Optimization Methods

PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning

Authors: Owen Millwood, Jack Miskelly, Bohao Yang, Prosanta Gope, Elif Kavun, Chenghua Lin | Published: 2022-07-11
Algorithm Design
Model Design and Accuracy
Defense Method

How many perturbations break this model? Evaluating robustness beyond adversarial accuracy

Authors: Raphael Olivier, Bhiksha Raj | Published: 2022-07-08 | Updated: 2023-08-10
Model Design and Accuracy
Adversarial Training
Defense Method

Federated and Transfer Learning: A Survey on Adversaries and Defense Mechanisms

Authors: Ehsan Hallaji, Roozbeh Razavi-Far, Mehrdad Saif | Published: 2022-07-05
Privacy Protection
Poisoning
Defense Method

Best Subset Selection with Efficient Primal-Dual Algorithm

Authors: Shaogang Ren, Guanhua Fang, Ping Li | Published: 2022-07-05
Algorithm Design
Optimization Problem
Feature Selection Method

Defending against the Label-flipping Attack in Federated Learning

Authors: Najeeb Moharram Jebreel, Josep Domingo-Ferrer, David Sánchez, Alberto Blanco-Justicia | Published: 2022-07-05
Algorithm Design
Poisoning
Defense Method

Federated Split GANs

Authors: Pranvera Kortoçi, Yilei Liang, Pengyuan Zhou, Lik-Hang Lee, Abbas Mehrabi, Pan Hui, Sasu Tarkoma, Jon Crowcroft | Published: 2022-07-04
Privacy Protection
Efficiency of Distributed Learning
Challenges of Generative Models

Machine Learning in Access Control: A Taxonomy and Survey

Authors: Mohammad Nur Nobi, Maanak Gupta, Lopamudra Praharaj, Mahmoud Abdelsalam, Ram Krishnan, Ravi Sandhu | Published: 2022-07-04
Dynamic Access Control
Machine Learning Application
Feature Selection Method