Literature Database

Conditional Analysis for Key-Value Data with Local Differential Privacy

Authors: Lin Sun, Jun Zhao, Xiaojun Ye, Shuo Feng, Teng Wang, Tao Bai | Published: 2019-07-11
Data Extraction and Analysis
Privacy Protection
Condition Monitoring

Why Blocking Targeted Adversarial Perturbations Impairs the Ability to Learn

Authors: Ziv Katzir, Yuval Elovici | Published: 2019-07-11
Adversarial Example
Adversarial attack
Deep Learning Method

Making AI Forget You: Data Deletion in Machine Learning

Authors: Antonio Ginart, Melody Y. Guan, Gregory Valiant, James Zou | Published: 2019-07-11 | Updated: 2019-11-04
Data Deletion Algorithm
Privacy Enhancing Technology
Machine learning

On Designing Machine Learning Models for Malicious Network Traffic Classification

Authors: Talha Ongun, Timothy Sakharaov, Simona Boboila, Alina Oprea, Tina Eliassi-Rad | Published: 2019-07-10
Data Extraction and Analysis
Attack Detection
Machine Learning Framework

Application Inference using Machine Learning based Side Channel Analysis

Authors: Nikhil Chawla, Arvind Singh, Monodeep Kar, Saibal Mukhopadhyay | Published: 2019-07-09
Automation of Cybersecurity
Data Extraction and Analysis
Machine Learning Framework

Neutaint: Efficient Dynamic Taint Analysis with Neural Networks

Authors: Dongdong She, Yizheng Chen, Abhishek Shah, Baishakhi Ray, Suman Jana | Published: 2019-07-08 | Updated: 2019-09-03
Security Testing
Data Flow Analysis
Deep Learning Method

Optimal Explanations of Linear Models

Authors: Dimitris Bertsimas, Arthur Delarue, Patrick Jaillet, Sebastien Martin | Published: 2019-07-08
Model Selection
Research Methodology
loss of Interpretability

The Price of Interpretability

Authors: Dimitris Bertsimas, Arthur Delarue, Patrick Jaillet, Sebastien Martin | Published: 2019-07-08
Model Selection
Optimization Strategy
Interpretability

Privacy-Preserving Classification with Secret Vector Machines

Authors: Valentin Hartmann, Konark Modi, Josep M. Pujol, Robert West | Published: 2019-07-08 | Updated: 2020-08-19
Data Extraction and Analysis
Privacy Protection
Federated Learning

QUOTIENT: Two-Party Secure Neural Network Training and Prediction

Authors: Nitin Agrawal, Ali Shahin Shamsabadi, Matt J. Kusner, Adrià Gascón | Published: 2019-07-08
MPC Algorithm
Privacy Protection
Deep Learning Method