Literature Database

Private Federated Learning with Domain Adaptation

Authors: Daniel Peterson, Pallika Kanani, Virendra J. Marathe | Published: 2019-12-13
Privacy Protection
Performance Evaluation Metrics
Machine Learning Technology

Potential adversarial samples for white-box attacks

Authors: Amir Nazemi, Paul Fieguth | Published: 2019-12-13
Robustness
Adversarial Spectrum Attack Detection
Deep Learning Method

Detecting and Correcting Adversarial Images Using Image Processing Operations

Authors: Huy H. Nguyen, Minoru Kuribayashi, Junichi Yamagishi, Isao Echizen | Published: 2019-12-11 | Updated: 2019-12-30
Adversarial Spectrum Attack Detection
Deep Learning Method
Watermarking Technology

Advances and Open Problems in Federated Learning

Authors: Peter Kairouz, H. Brendan McMahan, Brendan Avent, Aurélien Bellet, Mehdi Bennis, Arjun Nitin Bhagoji, Kallista Bonawitz, Zachary Charles, Graham Cormode, Rachel Cummings, Rafael G. L. D'Oliveira, Hubert Eichner, Salim El Rouayheb, David Evans, Josh Gardner, Zachary Garrett, Adrià Gascón, Badih Ghazi, Phillip B. Gibbons, Marco Gruteser, Zaid Harchaoui, Chaoyang He, Lie He, Zhouyuan Huo, Ben Hutchinson, Justin Hsu, Martin Jaggi, Tara Javidi, Gauri Joshi, Mikhail Khodak, Jakub Konečný, Aleksandra Korolova, Farinaz Koushanfar, Sanmi Koyejo, Tancrède Lepoint, Yang Liu, Prateek Mittal, Mehryar Mohri, Richard Nock, Ayfer Özgür, Rasmus Pagh, Mariana Raykova, Hang Qi, Daniel Ramage, Ramesh Raskar, Dawn Song, Weikang Song, Sebastian U. Stich, Ziteng Sun, Ananda Theertha Suresh, Florian Tramèr, Praneeth Vepakomma, Jianyu Wang, Li Xiong, Zheng Xu, Qiang Yang, Felix X. Yu, Han Yu, Sen Zhao | Published: 2019-12-10 | Updated: 2021-03-09
Secure Aggregation
Privacy Protection
Poisoning

Privacy-Preserving Blockchain Based Federated Learning with Differential Data Sharing

Authors: Anudit Nagar | Published: 2019-12-10
Privacy Protection
Blockchain Technology
Model Communication

Deep Learning Based Android Malware Detection Framework

Authors: Soumya Sourav, Devashish Khulbe, Naman Kapoor | Published: 2019-12-10
Security label
Malicious Website Detection
Deep Learning

Training Provably Robust Models by Polyhedral Envelope Regularization

Authors: Chen Liu, Mathieu Salzmann, Sabine Süsstrunk | Published: 2019-12-10 | Updated: 2021-09-20
Robustness
Optimization Problem
Deep Learning Method

Expansion of Cyber Attack Data From Unbalanced Datasets Using Generative Techniques

Authors: Ibrahim Yilmaz, Rahat Masum | Published: 2019-12-10
Data Generation
Performance Evaluation Metrics
Machine Learning Technology

Stealing Knowledge from Protected Deep Neural Networks Using Composite Unlabeled Data

Authors: Itay Mosafi, Eli David, Nathan S. Netanyahu | Published: 2019-12-09
DNN IP Protection Method
Adversarial Example
Deep Learning Method

Machine Unlearning

Authors: Lucas Bourtoule, Varun Chandrasekaran, Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, Nicolas Papernot | Published: 2019-12-09 | Updated: 2020-12-15
Privacy Protection
Fundamentals of Machine Learning
Adaptive Retraining Mechanism