Reaching Data Confidentiality and Model Accountability on the CalTrain Authors: Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy | Published: 2018-12-07 Trigger DetectionPerformance EvaluationFederated Learning 2018.12.07 2025.05.28 Literature Database
A Hybrid Approach to Privacy-Preserving Federated Learning Authors: Stacey Truex, Nathalie Baracaldo, Ali Anwar, Thomas Steinke, Heiko Ludwig, Rui Zhang, Yi Zhou | Published: 2018-12-07 | Updated: 2019-08-14 Privacy Enhancing ProtocolDifferential PrivacyFederated Learning 2018.12.07 2025.05.28 Literature Database
Deep-RBF Networks Revisited: Robust Classification with Rejection Authors: Pourya Habib Zadeh, Reshad Hosseini, Suvrit Sra | Published: 2018-12-07 Certified RobustnessExperimental ValidationAdversarial Example 2018.12.07 2025.05.28 Literature Database
Combatting Adversarial Attacks through Denoising and Dimensionality Reduction: A Cascaded Autoencoder Approach Authors: Rajeev Sahay, Rehana Mahfuz, Aly El Gamal | Published: 2018-12-07 Attack MethodAdversarial Example DetectionDefense Effectiveness Analysis 2018.12.07 2025.05.28 Literature Database
Use Dimensionality Reduction and SVM Methods to Increase the Penetration Rate of Computer Networks Authors: Amir Moradibaad, Ramin Jalilian Mashhoud | Published: 2018-12-07 | Updated: 2018-12-13 Malware DetectionResearch MethodologySelection Method 2018.12.07 2025.05.28 Literature Database
Three Tools for Practical Differential Privacy Authors: Koen Lennart van der Veen, Ruben Seggers, Peter Bloem, Giorgio Patrini | Published: 2018-12-07 Hyperparameter OptimizationPerformance EvaluationDifferential Privacy 2018.12.07 2025.05.28 Literature Database
Adversarial Attacks, Regression, and Numerical Stability Regularization Authors: Andre T. Nguyen, Edward Raff | Published: 2018-12-07 Robust RegressionAdversarial ExampleDefense Effectiveness Analysis 2018.12.07 2025.05.28 Literature Database
Privacy Partitioning: Protecting User Data During the Deep Learning Inference Phase Authors: Jianfeng Chi, Emmanuel Owusu, Xuwang Yin, Tong Yu, William Chan, Patrick Tague, Yuan Tian | Published: 2018-12-07 Privacy protection frameworkModel InversionAttack that Analyzes Images with AI to Infer Personal Information 2018.12.07 2025.05.28 Literature Database
Knockoff Nets: Stealing Functionality of Black-Box Models Authors: Tribhuvanesh Orekondy, Bernt Schiele, Mario Fritz | Published: 2018-12-06 Model Extraction AttackMedical Image AnalysisReinforcement Learning 2018.12.06 2025.05.28 Literature Database
The Limitations of Model Uncertainty in Adversarial Settings Authors: Kathrin Grosse, David Pfaff, Michael Thomas Smith, Michael Backes | Published: 2018-12-06 | Updated: 2019-11-17 Certified RobustnessRobustness EvaluationAdversarial Example 2018.12.06 2025.05.28 Literature Database