PrivFairFL: Privacy-Preserving Group Fairness in Federated Learning Authors: Sikha Pentyala, Nicola Neophytou, Anderson Nascimento, Martine De Cock, Golnoosh Farnadi | Published: 2022-05-23 | Updated: 2022-08-26 Privacy TechniqueFairness evaluationStatistical Methods 2022.05.23 2025.05.28 Literature Database
FedSA: Accelerating Intrusion Detection in Collaborative Environments with Federated Simulated Annealing Authors: Helio N. Cunha Neto, Ivana Dusparic, Diogo M. F. Mattos, Natalia C. Fernandes | Published: 2022-05-23 Convergence PropertyPerformance Evaluation MetricsLoss Function 2022.05.23 2025.05.28 Literature Database
Robust Quantity-Aware Aggregation for Federated Learning Authors: Jingwei Yi, Fangzhao Wu, Huishuai Zhang, Bin Zhu, Tao Qi, Guangzhong Sun, Xing Xie | Published: 2022-05-22 | Updated: 2023-07-26 Attack Methods against DFLSecure AggregationRobustness Evaluation 2022.05.22 2025.05.28 Literature Database
Robust Sensible Adversarial Learning of Deep Neural Networks for Image Classification Authors: Jungeum Kim, Xiao Wang | Published: 2022-05-20 Robustness EvaluationLoss FunctionAdversarial Example 2022.05.20 2025.05.28 Literature Database
Getting a-Round Guarantees: Floating-Point Attacks on Certified Robustness Authors: Jiankai Jin, Olga Ohrimenko, Benjamin I. P. Rubinstein | Published: 2022-05-20 | Updated: 2024-09-09 Robustness EvaluationAdversarial ExampleThreat Model 2022.05.20 2025.05.28 Literature Database
SafeNet: The Unreasonable Effectiveness of Ensembles in Private Collaborative Learning Authors: Harsh Chaudhari, Matthew Jagielski, Alina Oprea | Published: 2022-05-20 | Updated: 2022-09-08 Backdoor AttackMembership InferenceRobustness Evaluation 2022.05.20 2025.05.28 Literature Database
Focused Adversarial Attacks Authors: Thomas Cilloni, Charles Walter, Charles Fleming | Published: 2022-05-19 Attack Methods against DFLAttack TypeAdversarial Example 2022.05.19 2025.05.28 Literature Database
Differential Privacy: What is all the noise about? Authors: Roxana Danger | Published: 2022-05-19 DP-SGDPrivacy TechniquePoisoning 2022.05.19 2025.05.28 Literature Database
A False Sense of Security? Revisiting the State of Machine Learning-Based Industrial Intrusion Detection Authors: Dominik Kus, Eric Wagner, Jan Pennekamp, Konrad Wolsing, Ina Berenice Fink, Markus Dahlmanns, Klaus Wehrle, Martin Henze | Published: 2022-05-18 Membership InferencePerformance EvaluationAttack Detection 2022.05.18 2025.05.28 Literature Database
Adaptive Hybrid Heterogeneous IDS for 6LoWPAN Authors: Aryan Mohammadi Pasikhani, John A Clark, Prosanta Gope | Published: 2022-05-18 Online Decision MakingAttack DetectionAdaptive Retraining Mechanism 2022.05.18 2025.05.28 Literature Database