Stability and Generalization of Differentially Private Minimax Problems Authors: Yilin Kang, Yong Liu, Jian Li, Weiping Wang | Published: 2022-04-11 | Updated: 2022-04-22 Privacy ProtectionGeneralization PerformanceLoss Function 2022.04.11 2025.05.28 Literature Database
Dependable Intrusion Detection System for IoT: A Deep Transfer Learning-based Approach Authors: Sk. Tanzir Mehedi, Adnan Anwar, Ziaur Rahman, Kawsar Ahmed, Rafiqul Islam | Published: 2022-04-11 Security AnalysisData CollectionDeep Transfer Learning 2022.04.11 2025.05.28 Literature Database
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis Authors: Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo | Published: 2022-04-10 | Updated: 2022-05-05 Algorithm DesignData Extraction and Analysisevaluation metrics 2022.04.10 2025.05.28 Literature Database
An Adaptive Black-box Backdoor Detection Method for Deep Neural Networks Authors: Xinqiao Zhang, Huili Chen, Ke Huang, Farinaz Koushanfar | Published: 2022-04-08 Trojan Horse SignatureTrojan DetectionBackdoor Attack 2022.04.08 2025.05.28 Literature Database
HBFL: A Hierarchical Blockchain-based Federated Learning Framework for a Collaborative IoT Intrusion Detection Authors: Mohanad Sarhan, Wai Weng Lo, Siamak Layeghy, Marius Portmann | Published: 2022-04-08 Smart ContractPrivacy ProtectionDistributed Learning 2022.04.08 2025.05.28 Literature Database
Security Aspects of Quantum Machine Learning: Opportunities, Threats and Defenses Authors: Satwik Kundu, Swaroop Ghosh | Published: 2022-04-07 Security AnalysisHardware SecurityQuantum Machine Learning 2022.04.07 2025.05.28 Literature Database
Machine Learning-Enabled IoT Security: Open Issues and Challenges Under Advanced Persistent Threats Authors: Zhiyan Chen, Jinxin Liu, Yu Shen, Murat Simsek, Burak Kantarci, Hussein T. Mouftah, Petar Djukic | Published: 2022-04-07 | Updated: 2022-04-17 Characteristics of APT AttacksSecurity AnalysisAnomaly Detection Method 2022.04.07 2025.05.28 Literature Database
What You See is What You Get: Principled Deep Learning via Distributional Generalization Authors: Bogdan Kulynych, Yao-Yuan Yang, Yaodong Yu, Jarosław Błasiok, Preetum Nakkiran | Published: 2022-04-07 | Updated: 2022-10-17 DP-SGDPrivacy AssessmentImprovement of Learning 2022.04.07 2025.05.28 Literature Database
User-Level Differential Privacy against Attribute Inference Attack of Speech Emotion Recognition in Federated Learning Authors: Tiantian Feng, Raghuveer Peri, Shrikanth Narayanan | Published: 2022-04-05 | Updated: 2022-05-17 Privacy Protection MechanismPrivacy Enhancing TechnologyPrivacy Assessment 2022.04.05 2025.05.28 Literature Database
Leveraging Disentangled Representations to Improve Vision-Based Keystroke Inference Attacks Under Low Data Authors: John Lim, Jan-Michael Frahm, Fabian Monrose | Published: 2022-04-05 Dataset GenerationPrivacy Enhancing TechnologyMachine Learning 2022.04.05 2025.05.28 Literature Database