High-Dimensional Private Empirical Risk Minimization by Greedy Coordinate Descent Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2022-07-04 | Updated: 2023-04-09 Algorithm DesignConvergence GuaranteeSelection and Evaluation of Optimization Algorithms 2022.07.04 2025.05.28 Literature Database
FL-Defender: Combating Targeted Attacks in Federated Learning Authors: Najeeb Jebreel, Josep Domingo-Ferrer | Published: 2022-07-02 Attack Methods against DFLAlgorithm DesignPoisoning 2022.07.02 2025.05.28 Literature Database
When Does Differentially Private Learning Not Suffer in High Dimensions? Authors: Xuechen Li, Daogao Liu, Tatsunori Hashimoto, Huseyin A. Inan, Janardhan Kulkarni, Yin Tat Lee, Abhradeep Guha Thakurta | Published: 2022-07-01 | Updated: 2022-10-26 Algorithm DesignSample ComplexityPrivacy Risk Management 2022.07.01 2025.05.28 Literature Database
IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31 Algorithm DesignEfficient Proof SystemAdversarial Learning 2022.06.29 2025.05.28 Literature Database
Approximate Data Deletion in Generative Models Authors: Zhifeng Kong, Scott Alfeld | Published: 2022-06-29 Algorithm DesignData LeakageHypothesis Testing 2022.06.29 2025.05.28 Literature Database
Matryoshka: Stealing Functionality of Private ML Data by Hiding Models in Model Authors: Xudong Pan, Yifan Yan, Shengyao Zhang, Mi Zhang, Min Yang | Published: 2022-06-29 DNN IP Protection MethodAlgorithm DesignMembership Inference 2022.06.29 2025.05.28 Literature Database
A Deep Learning Approach to Create DNS Amplification Attacks Authors: Jared Mathews, Prosenjit Chatterjee, Shankar Banik, Cory Nance | Published: 2022-06-29 Algorithm DesignBackdoor AttackAdversarial Attack Detection 2022.06.29 2025.05.28 Literature Database
How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28 Algorithm DesignAdversarial ExampleComputational Efficiency 2022.06.28 2025.05.28 Literature Database
Parallel Instance Filtering for Malware Detection Authors: Martin Jureček, Olha Jurečková | Published: 2022-06-28 Algorithm DesignComputational EfficiencyStatic Analysis 2022.06.28 2025.05.28 Literature Database
Multifamily Malware Models Authors: Samanvitha Basole, Fabio Di Troia, Mark Stamp | Published: 2022-06-27 Algorithm DesignMalware Propagation MeansEvaluation Method 2022.06.27 2025.05.28 Literature Database