Literature Database

Production of Categorical Data Verifying Differential Privacy: Conception and Applications to Machine Learning

Authors: Héber H. Arcolezi | Published: 2022-04-02
Privacy Enhancing Protocol
Privacy Enhancing Technology
Privacy Assessment

Scalable Whitebox Attacks on Tree-based Models

Authors: Giuseppe Castiglione, Gavin Ding, Masoud Hashemi, Christopher Srinivasa, Ga Wu | Published: 2022-03-31
Machine Learning
Durability Issue
Computational Complexity

Truth Serum: Poisoning Machine Learning Models to Reveal Their Secrets

Authors: Florian Tramèr, Reza Shokri, Ayrton San Joaquin, Hoang Le, Matthew Jagielski, Sanghyun Hong, Nicholas Carlini | Published: 2022-03-31 | Updated: 2022-10-06
Privacy Assessment
Poisoning
Membership Inference

Efficient Dropout-resilient Aggregation for Privacy-preserving Machine Learning

Authors: Ziyao Liu, Jiale Guo, Kwok-Yan Lam, Jun Zhao | Published: 2022-03-31
Privacy Enhancing Protocol
Distributed Learning
Multi-Party Computation

Differentially Private Federated Learning via Reconfigurable Intelligent Surface

Authors: Yuhan Yang, Yong Zhou, Youlong Wu, Yuanming Shi | Published: 2022-03-31
Privacy Protection Mechanism
Privacy Assessment
Improvement of Learning

Privacy-Preserving Aggregation in Federated Learning: A Survey

Authors: Ziyao Liu, Jiale Guo, Wenzhuo Yang, Jiani Fan, Kwok-Yan Lam, Jun Zhao | Published: 2022-03-31 | Updated: 2022-07-13
Privacy Enhancing Protocol
Privacy Enhancing Technology
Poisoning

Ransomware Detection using Process Memory

Authors: Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter | Published: 2022-03-31
Algorithm
Data Preprocessing
Machine Learning

Cancellable Template Design for Privacy-Preserving EEG Biometric Authentication Systems

Authors: Min Wang, Song Wang, Jiankun Hu | Published: 2022-03-31
EEG Biometrics
Privacy Enhancing Technology
Signal Analysis

Spy in the GPU-box: Covert and Side Channel Attacks on Multi-GPU Systems

Authors: Sankha Baran Dutta, Hoda Naghibijouybari, Arjun Gupta, Nael Abu-Ghazaleh, Andres Marquez, Kevin Barker | Published: 2022-03-30
GPU Vulnerability
Privacy Protection Method
Physical attack

NICGSlowDown: Evaluating the Efficiency Robustness of Neural Image Caption Generation Models

Authors: Simin Chen, Zihe Song, Mirazul Haque, Cong Liu, Wei Yang | Published: 2022-03-29
Model DoS
Adversarial Example
Adversarial Learning