Literature Database

The More, the Better? A Study on Collaborative Machine Learning for DGA Detection

Authors: Arthur Drichel, Benedikt Holmes, Justus von Brandt, Ulrike Meyer | Published: 2021-09-24
Data Generation
Performance Evaluation
Federated Learning

Morse-STF: Improved Protocols for Privacy-Preserving Machine Learning

Authors: Qizhi Zhang, Sijun Tan, Lichun Li, Yun Zhao, Dong Yin, Shan Yin | Published: 2021-09-24 | Updated: 2022-05-19
Algorithm
Machine Learning Application
Linear Model

A Validated Privacy-Utility Preserving Recommendation System with Local Differential Privacy

Authors: Seryne Rahali, Maryline Laurent, Souha Masmoudi, Charles Roux, Brice Mazeau | Published: 2021-09-23
Data Privacy Assessment
Data-Driven Clustering
Privacy Risk Management

A Novel Open Set Energy-based Flow Classifier for Network Intrusion Detection

Authors: Manuela M. C. Souza, Camila Pontes, Joao Gondim, Luis P. F. Garcia, Luiz DaSilva, Marcelo A. Marotta | Published: 2021-09-23 | Updated: 2022-04-26
Algorithm
Energy Management
Performance Evaluation

Secure PAC Bayesian Regression via Real Shamir Secret Sharing

Authors: Jaron Skovsted Gundersen, Bulut Kuskonmaz, Rafael Wisniewski | Published: 2021-09-23 | Updated: 2023-04-17
Algorithm
Privacy Risk Management
Linear Model

Adversarial Transfer Attacks With Unknown Data and Class Overlap

Authors: Luke E. Richards, André Nguyen, Ryan Capps, Steven Forsythe, Cynthia Matuszek, Edward Raff | Published: 2021-09-23 | Updated: 2021-09-24
Poisoning
Robustness
Adversarial attack

Partial sensitivity analysis in differential privacy

Authors: Tamara T. Mueller, Alexander Ziller, Dmitrii Usynin, Moritz Knolle, Friederike Jungmann, Daniel Rueckert, Georgios Kaissis | Published: 2021-09-22 | Updated: 2021-11-28
Data Privacy Assessment
Privacy Risk Management
Feature Importance Analysis

An automatic differentiation system for the age of differential privacy

Authors: Dmitrii Usynin, Alexander Ziller, Moritz Knolle, Andrew Trask, Kritika Prakash, Daniel Rueckert, Georgios Kaissis | Published: 2021-09-22 | Updated: 2022-04-05
Data Privacy Assessment
Privacy Risk Management
Machine Learning Application

Attacks on Visualization-Based Malware Detection: Balancing Effectiveness and Executability

Authors: Hadjer Benkraouda, Jingyu Qian, Hung Quoc Tran, Berkay Kaplan | Published: 2021-09-21
Malware Detection Method
Adversarial Example
Adversarial attack

DeSMP: Differential Privacy-exploited Stealthy Model Poisoning Attacks in Federated Learning

Authors: Md Tamjid Hossain, Shafkat Islam, Shahriar Badsha, Haoting Shen | Published: 2021-09-21
Backdoor Attack
Federated Learning
Defense Mechanism