Adversarial Robustness is at Odds with Lazy Training Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17 Algorithm DesignAdversarial ExampleAdversarial Attack Detection 2022.06.18 2025.05.28 Literature Database
Automatic Hardware Trojan Insertion using Machine Learning Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18 Algorithm DesignTrojan DetectionMachine Learning Method 2022.04.18 2025.05.28 Literature Database
Finding MNEMON: Reviving Memories of Node Embeddings Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29 Algorithm DesignDataset evaluationevaluation metrics 2022.04.14 2025.05.28 Literature Database
LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data Authors: Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic | Published: 2022-04-14 Algorithm DesignData Extraction and AnalysisMachine Learning Application 2022.04.14 2025.05.28 Literature Database
Improving Differential-Neural Distinguisher Model For DES, Chaskey, and PRESENT Authors: Liu Zhang, Zilong Wang | Published: 2022-04-13 Algorithm DesignExperimental Validationevaluation metrics 2022.04.13 2025.05.28 Literature Database
Malware Analysis with Symbolic Execution and Graph Kernel Authors: Charles-Henry Bertrand Van Ouytsel, Axel Legay | Published: 2022-04-12 Algorithm DesignGraph KernelMachine Learning Application 2022.04.12 2025.05.28 Literature Database
BABD: A Bitcoin Address Behavior Dataset for Pattern Analysis Authors: Yuexin Xiang, Yuchen Lei, Ding Bao, Wei Ren, Tiantian Li, Qingqing Yang, Wenmao Liu, Tianqing Zhu, Kim-Kwang Raymond Choo | Published: 2022-04-10 | Updated: 2022-05-05 Algorithm DesignData Extraction and Analysisevaluation metrics 2022.04.10 2025.05.28 Literature Database
Privacy-preserving Similarity Calculation of Speaker Features Using Fully Homomorphic Encryption Authors: Yogachandran Rahulamathavan | Published: 2022-02-16 | Updated: 2022-03-14 Algorithm DesignUser Authentication SystemCryptographic Protocol 2022.02.16 2025.05.28 Literature Database
A Characterization of Semi-Supervised Adversarially-Robust PAC Learnability Authors: Idan Attias, Steve Hanneke, Yishay Mansour | Published: 2022-02-11 | Updated: 2024-05-05 Algorithm DesignData Selection StrategyRobustness Evaluation 2022.02.11 2025.05.28 Literature Database
Personalization Improves Privacy-Accuracy Tradeoffs in Federated Learning Authors: Alberto Bietti, Chen-Yu Wei, Miroslav Dudík, John Langford, Zhiwei Steven Wu | Published: 2022-02-10 | Updated: 2022-07-15 Algorithm DesignPrivacy Risk ManagementPrivacy Enhancing Protocol 2022.02.10 2025.05.28 Literature Database