Literature Database

Domain-Independent Deception: Definition, Taxonomy and the Linguistic Cues Debate

Authors: Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Xuting Liu | Published: 2022-07-04
Review and Investigation
Information Gathering Methods
Deception Detection

High-Dimensional Private Empirical Risk Minimization by Greedy Coordinate Descent

Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2022-07-04 | Updated: 2023-04-09
Algorithm Design
Convergence Guarantee
Selection and Evaluation of Optimization Algorithms

Wild Networks: Exposure of 5G Network Infrastructures to Adversarial Examples

Authors: Giovanni Apruzzese, Rodion Vladimirov, Aliya Tastemirova, Pavel Laskov | Published: 2022-07-04
Network Slicing
Risk Assessment Method
Adversarial Learning

Cybersecurity: Past, Present and Future

Authors: Shahid Alam | Published: 2022-07-04 | Updated: 2024-03-03
Storage Device
Digital Forensics
Malware Detection

Ransomware Classification and Detection With Machine Learning Algorithms

Authors: Mohammad Masum, Md Jobair Hossain Faruk, Hossain Shahriar, Kai Qian, Dan Lo, Muhaiminul Islam Adnan | Published: 2022-07-02
Backdoor Attack
Dynamic Analysis
Evaluation Method

FL-Defender: Combating Targeted Attacks in Federated Learning

Authors: Najeeb Jebreel, Josep Domingo-Ferrer | Published: 2022-07-02
Attack Methods against DFL
Algorithm Design
Poisoning

Firenze: Model Evaluation Using Weak Signals

Authors: Bhavna Soman, Ali Torkamani, Michael J. Morais, Jeffrey Bickford, Baris Coskun | Published: 2022-07-02
Data Generation
Model Interpretability
Evaluation Method

The Dangers of Computational Law and Cybersecurity; Perspectives from Engineering and the AI Act

Authors: Kaspar Rosager Ludvigsen, Shishir Nagaraja, Angela Daly | Published: 2022-07-01
Cybersecurity
Risk Management
Artificial Intelligence Regulation

Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks

Authors: Ignjat Pejic, Rui Wang, Kaitai Liang | Published: 2022-07-01
Future Research
Encryption Method
Challenges of Generative Models

When Does Differentially Private Learning Not Suffer in High Dimensions?

Authors: Xuechen Li, Daogao Liu, Tatsunori Hashimoto, Huseyin A. Inan, Janardhan Kulkarni, Yin Tat Lee, Abhradeep Guha Thakurta | Published: 2022-07-01 | Updated: 2022-10-26
Algorithm Design
Sample Complexity
Privacy Risk Management