Literature Database

Deep Leakage from Model in Federated Learning

Authors: Zihao Zhao, Mengen Luo, Wenbo Ding | Published: 2022-06-10
Attack Methods against DFL
Poisoning
Federated Learning

Membership Inference via Backdooring

Authors: Hongsheng Hu, Zoran Salcic, Gillian Dobbie, Jinjun Chen, Lichao Sun, Xuyun Zhang | Published: 2022-06-10
Attack Methods against DFL
Membership Inference
Adversarial Attack Methods

Leveraging Centric Data Federated Learning Using Blockchain For Integrity Assurance

Authors: Riadh Ben Chaabene, Darine Amayed, Mohamed Cheriet | Published: 2022-06-09
Smart Contract
Federated Learning

A Critical Review on the Use (and Misuse) of Differential Privacy in Machine Learning

Authors: Alberto Blanco-Justicia, David Sanchez, Josep Domingo-Ferrer, Krishnamurty Muralidhar | Published: 2022-06-09 | Updated: 2022-07-05
Privacy Assessment
Impact of Generalization
Adversarial Example

GSmooth: Certified Robustness against Semantic Transformations via Generalized Randomized Smoothing

Authors: Zhongkai Hao, Chengyang Ying, Yinpeng Dong, Hang Su, Jun Zhu, Jian Song | Published: 2022-06-09 | Updated: 2022-06-29
Robustness
Impact of Generalization
Deep Learning Method

Analytical Composition of Differential Privacy via the Edgeworth Accountant

Authors: Hua Wang, Sheng Gao, Huanyu Zhang, Milan Shen, Weijie J. Su | Published: 2022-06-09
Privacy Assessment
Federated Learning
Function Definition

Generative Adversarial Networks and Image-Based Malware Classification

Authors: Huy Nguyen, Fabio Di Troia, Genya Ishigaki, Mark Stamp | Published: 2022-06-08
Prompt Injection
Malware Propagation Means
Image Forensics

To remove or not remove Mobile Apps? A data-driven predictive model approach

Authors: Fadi Mohsen, Dimka Karastoyanova, George Azzopardi | Published: 2022-06-08
Data Management System
User Behavior Analysis
Feature Engineering

Gradient Obfuscation Gives a False Sense of Security in Federated Learning

Authors: Kai Yue, Richeng Jin, Chau-Wai Wong, Dror Baron, Huaiyu Dai | Published: 2022-06-08 | Updated: 2022-10-14
Attack Methods against DFL
Poisoning
Reconstruction Durability

Dap-FL: Federated Learning flourishes by adaptive tuning and secure aggregation

Authors: Qian Chen, Zilong Wang, Jiawei Chen, Haonan Yan, Xiaodong Lin | Published: 2022-06-08
Reinforcement Learning
Deep Learning Method
Federated Learning