Deep Learning Application in Security and Privacy — Theory and Practice: A Position Paper Authors: Julia A. Meister, Raja Naeem Akram, Konstantinos Markantonakis | Published: 2018-12-01 Data Flow AnalysisGeneralization PerformanceLegal Compliance 2018.12.01 2025.05.28 Literature Database
Discrete Adversarial Attacks and Submodular Optimization with Applications to Text Classification Authors: Qi Lei, Lingfei Wu, Pin-Yu Chen, Alexandros G. Dimakis, Inderjit S. Dhillon, Michael Witbrock | Published: 2018-12-01 | Updated: 2019-04-04 Application of Text ClassificationAdversarial ExampleOptimization Problem 2018.12.01 2025.05.28 Literature Database
Analyzing Federated Learning through an Adversarial Lens Authors: Arjun Nitin Bhagoji, Supriyo Chakraborty, Prateek Mittal, Seraphin Calo | Published: 2018-11-29 | Updated: 2019-11-25 PoisoningFederated LearningWeight Update Method 2018.11.29 2025.05.28 Literature Database
Joint Service Pricing and Cooperative Relay Communication for Federated Learning Authors: Shaohan Feng, Dusit Niyato, Ping Wang, Dong In Kim, Ying-Chang Liang | Published: 2018-11-29 Data CollectionOptimization ProblemFederated Learning 2018.11.29 2025.05.28 Literature Database
MOBIUS: Model-Oblivious Binarized Neural Networks Authors: Hiromasa Kitai, Jason Paul Cruz, Naoto Yanai, Naohisa Nishida, Tatsumi Oba, Yuji Unagami, Tadanori Teruya, Nuttapong Attrapadung, Takahiro Matsuda, Goichiro Hanaoka | Published: 2018-11-29 Trigger DetectionPrivacy-Preserving Machine LearningDifferential Privacy 2018.11.29 2025.05.28 Literature Database
An Adversarial Approach for Explainable AI in Intrusion Detection Systems Authors: Daniel L. Marino, Chathurika S. Wickramasinghe, Milos Manic | Published: 2018-11-28 Identification of AI OutputModel Performance EvaluationAdversarial Example 2018.11.28 2025.05.28 Literature Database
Adversarial Machine Learning And Speech Emotion Recognition: Utilizing Generative Adversarial Networks For Robustness Authors: Siddique Latif, Rajib Rana, Junaid Qadir | Published: 2018-11-28 | Updated: 2018-12-30 Certified RobustnessRobustness ImprovementDefense Method 2018.11.28 2025.05.28 Literature Database
Robust Classification of Financial Risk Authors: Suproteem K. Sarkar, Kojin Oshiba, Daniel Giebisch, Yaron Singer | Published: 2018-11-27 Model Performance EvaluationRobustness ImprovementAdversarial Learning 2018.11.27 2025.05.28 Literature Database
A Frank-Wolfe Framework for Efficient and Effective Adversarial Attacks Authors: Jinghui Chen, Dongruo Zhou, Jinfeng Yi, Quanquan Gu | Published: 2018-11-27 | Updated: 2019-09-15 Backdoor DetectionModel Performance EvaluationSelection and Evaluation of Optimization Algorithms 2018.11.27 2025.05.28 Literature Database
Distributed and Secure ML with Self-tallying Multi-party Aggregation Authors: Yunhui Long, Tanmay Gangwani, Haris Mughees, Carl Gunter | Published: 2018-11-26 Model Performance EvaluationSecure Arithmetic ComputationCryptographic Protocol 2018.11.26 2025.05.28 Literature Database