Locally Differentially Private Distributed Online Learning with Guaranteed Optimality Authors: Ziqin Chen, Yongqiang Wang | Published: 2023-06-25 | Updated: 2024-08-23 Algorithm DesignPrivacy ProtectionConvergence Guarantee 2023.06.25 2025.05.28 Literature Database
Machine Learning needs Better Randomness Standards: Randomised Smoothing and PRNG-based attacks Authors: Pranav Dahiya, Ilia Shumailov, Ross Anderson | Published: 2023-06-24 | Updated: 2024-02-10 Algorithm DesignAdversarial attackStatistical Testing 2023.06.24 2025.05.28 Literature Database
Decentralized Online Federated G-Network Learning for Lightweight Intrusion Detection Authors: Mert Nakıp, Baran Can Gül, Erol Gelenbe | Published: 2023-06-22 | Updated: 2023-11-28 Algorithm DesignMalware Detection MethodFederated Learning 2023.06.22 2025.05.28 Literature Database
Using Topological Data Analysis to classify Encrypted Bits Authors: Jayati Kaushik, Aaruni Kaushik, Upasana Parashar | Published: 2023-01-18 Algorithm DesignMachine LearningImage Forensics 2023.01.18 2025.05.28 Literature Database
Reconstructing Training Data from Model Gradient, Provably Authors: Zihan Wang, Jason D. Lee, Qi Lei | Published: 2022-12-07 | Updated: 2023-06-10 Algorithm DesignPrivacy Risk ManagementReconstruction Durability 2022.12.07 2025.05.28 Literature Database
Pareto Regret Analyses in Multi-objective Multi-armed Bandit Authors: Mengfan Xu, Diego Klabjan | Published: 2022-12-01 | Updated: 2023-05-30 Algorithm DesignOnline LearningOptimization Problem 2022.12.01 2025.05.28 Literature Database
Targets in Reinforcement Learning to solve Stackelberg Security Games Authors: Saptarashmi Bandyopadhyay, Chenqi Zhu, Philip Daniel, Joshua Morrison, Ethan Shay, John Dickerson | Published: 2022-11-30 Algorithm DesignStacking ModelSecurity Assurance 2022.11.30 2025.05.28 Literature Database
Multi-Player Bandits Robust to Adversarial Collisions Authors: Shivakumar Mahesh, Anshuka Rangi, Haifeng Xu, Long Tran-Thanh | Published: 2022-11-15 Algorithm DesignAttack MethodOptimization Methods 2022.11.15 2025.05.28 Literature Database
Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability Authors: Zhao Song, Yitan Wang, Zheng Yu, Lichen Zhang | Published: 2022-10-15 | Updated: 2023-06-06 Algorithm DesignPrivacy Risk ManagementConvergence Guarantee 2022.10.15 2025.05.28 Literature Database
Distributed Non-Convex Optimization with One-Bit Compressors on Heterogeneous Data: Efficient and Resilient Algorithms Authors: Ming Xiang, Lili Su | Published: 2022-10-03 | Updated: 2023-02-17 AlgorithmAlgorithm DesignConvergence Guarantee 2022.10.03 2025.05.28 Literature Database