Differentially Private Federated Learning: A Client Level Perspective Authors: Robin C. Geyer, Tassilo Klein, Moin Nabi | Published: 2017-12-20 | Updated: 2018-03-01 Client-Side ComponentPrivacy ProtectionFederated Learning 2017.12.20 2025.05.28 Literature Database
Differentially Private Distributed Learning for Language Modeling Tasks Authors: Vadim Popov, Mikhail Kudinov, Irina Piontkovskaya, Petr Vytovtov, Alex Nevidomsky | Published: 2017-12-20 | Updated: 2018-03-06 Detection of Poison Data for Backdoor AttacksPrivacy IssuesDifferential Privacy 2017.12.20 2025.05.28 Literature Database
Query-Efficient Black-box Adversarial Examples (superceded) Authors: Andrew Ilyas, Logan Engstrom, Anish Athalye, Jessy Lin | Published: 2017-12-19 | Updated: 2018-04-06 PoisoningAdversarial LearningAdversarial Attack Methods 2017.12.19 2025.05.28 Literature Database
Adversarial Examples: Attacks and Defenses for Deep Learning Authors: Xiaoyong Yuan, Pan He, Qile Zhu, Xiaolin Li | Published: 2017-12-19 | Updated: 2018-07-07 Adversarial Spectrum Attack DetectionAdversarial LearningDeep Learning 2017.12.19 2025.05.28 Literature Database
When Not to Classify: Anomaly Detection of Attacks (ADA) on DNN Classifiers at Test Time Authors: David J. Miller, Yulia Wang, George Kesidis | Published: 2017-12-18 | Updated: 2018-06-28 Trigger DetectionAdversarial ExampleAdversarial Attack Methods 2017.12.18 2025.05.28 Literature Database
Cyberattack Detection in Mobile Cloud Computing: A Deep Learning Approach Authors: Khoi Khac Nguyen, Dinh Thai Hoang, Dusit Niyato, Ping Wang, Diep Nguyen, Eryk Dutkiewicz | Published: 2017-12-16 ML-Based IDSProactive DefenseMachine Learning Algorithm 2017.12.16 2025.05.28 Literature Database
DANCin SEQ2SEQ: Fooling Text Classifiers with Adversarial Text Example Generation Authors: Catherine Wong | Published: 2017-12-14 Spam DetectionBackdoor DetectionAdversarial Learning 2017.12.14 2025.05.28 Literature Database
Decision-Based Adversarial Attacks: Reliable Attacks Against Black-Box Machine Learning Models Authors: Wieland Brendel, Jonas Rauber, Matthias Bethge | Published: 2017-12-12 | Updated: 2018-02-16 Certified RobustnessAdversarial LearningAdversarial Attack Methods 2017.12.12 2025.05.28 Literature Database
Feature Extraction and Feature Selection: Reducing Data Complexity with Apache Spark Authors: Dimitrios Sisiaridis, Olivier Markowitch | Published: 2017-12-11 Clustering methodsData PreprocessingFeature Extraction Method 2017.12.11 2025.05.28 Literature Database
Improving Malware Detection Accuracy by Extracting Icon Information Authors: Pedro Silva, Sepehr Akhavan-Masouleh, Li Li | Published: 2017-12-10 Clustering methodsMachine Learning AlgorithmImage Feature Extraction 2017.12.10 2025.05.28 Literature Database