Literature Database

Constant-round Blind Classical Verification of Quantum Sampling

Authors: Kai-Min Chung, Yi Lee, Han-Hsuan Lin, Xiaodi Wu | Published: 2020-12-09 | Updated: 2021-10-25
Protocol Procedure
Quantum Cryptography Technology
Function Definition

Ditto: Fair and Robust Federated Learning Through Personalization

Authors: Tian Li, Shengyuan Hu, Ahmad Beirami, Virginia Smith | Published: 2020-12-08 | Updated: 2021-06-15
Parameter Tuning
Optimization Methods
Weight Update Method

Certified Robustness of Nearest Neighbors against Data Poisoning and Backdoor Attacks

Authors: Jinyuan Jia, Yupei Liu, Xiaoyu Cao, Neil Zhenqiang Gong | Published: 2020-12-07 | Updated: 2021-12-02
Backdoor Attack
Attack Method
Machine Learning

Deep Learning Methods for Credit Card Fraud Detection

Authors: Thanh Thi Nguyen, Hammad Tahir, Mohamed Abdelrazek, Ali Babar | Published: 2020-12-07
Machine Learning
Self-Learning Method
Weight Update Method

Autoencoding Variational Autoencoder

Authors: A. Taylan Cemgil, Sumedh Ghaisas, Krishnamurthy Dvijotham, Sven Gowal, Pushmeet Kohli | Published: 2020-12-07
Adversarial Learning
Generative Model Characteristics
Self-Learning Method

Black-box Model Inversion Attribute Inference Attacks on Classification Models

Authors: Shagufta Mehnaz, Ninghui Li, Elisa Bertino | Published: 2020-12-07
Membership Inference
Attack Method
Privacy Protection in Machine Learning

Review: Deep Learning Methods for Cybersecurity and Intrusion Detection Systems

Authors: Mayra Macas, Chunming Wu | Published: 2020-12-04
Machine Learning
Deep Learning
Anomaly Detection Algorithm

ESCAPED: Efficient Secure and Private Dot Product Framework for Kernel-based Machine Learning Algorithms with Applications in Healthcare

Authors: Ali Burak Ünal, Mete Akgün, Nico Pfeifer | Published: 2020-12-04
Security Analysis
Framework
Privacy Protection in Machine Learning

Unleashing the Tiger: Inference Attacks on Split Learning

Authors: Dario Pasquini, Giuseppe Ateniese, Massimo Bernaschi | Published: 2020-12-04 | Updated: 2021-11-04
Membership Inference
Attack Method
Privacy Protection in Machine Learning

TrollHunter [Evader]: Automated Detection [Evasion] of Twitter Trolls During the COVID-19 Pandemic

Authors: Peter Jachim, Filipo Sharevski, Paige Treebridge | Published: 2020-12-04 | Updated: 2020-12-07
Content Moderation
Security Analysis
Adversarial Learning