Algorithm Design

Privacy-preserving Similarity Calculation of Speaker Features Using Fully Homomorphic Encryption

Authors: Yogachandran Rahulamathavan | Published: 2022-02-16 | Updated: 2022-03-14
Algorithm Design
User Authentication System
Cryptographic Protocol

A Characterization of Semi-Supervised Adversarially-Robust PAC Learnability

Authors: Idan Attias, Steve Hanneke, Yishay Mansour | Published: 2022-02-11 | Updated: 2024-05-05
Algorithm Design
Data Selection Strategy
Robustness Evaluation

Personalization Improves Privacy-Accuracy Tradeoffs in Federated Learning

Authors: Alberto Bietti, Chen-Yu Wei, Miroslav Dudík, John Langford, Zhiwei Steven Wu | Published: 2022-02-10 | Updated: 2022-07-15
Algorithm Design
Privacy Risk Management
Privacy Enhancing Protocol

Bilevel Optimization with a Lower-level Contraction: Optimal Sample Complexity without Warm-start

Authors: Riccardo Grazzi, Massimiliano Pontil, Saverio Salzo | Published: 2022-02-07 | Updated: 2023-11-16
Algorithm Design
Convergence Analysis
Weight Update Method

A Robust Phased Elimination Algorithm for Corruption-Tolerant Gaussian Process Bandits

Authors: Ilija Bogunovic, Zihan Li, Andreas Krause, Jonathan Scarlett | Published: 2022-02-03 | Updated: 2022-03-28
Algorithm Design
Robustness Evaluation
Convergence Analysis

Byzantine-Robust Decentralized Learning via ClippedGossip

Authors: Lie He, Sai Praneeth Karimireddy, Martin Jaggi | Published: 2022-02-03 | Updated: 2023-04-20
Algorithm Design
Group-Based Robustness
Convergence Analysis

A General Framework for Evaluating Robustness of Combinatorial Optimization Solvers on Graphs

Authors: Han Lu, Zenan Li, Runzhong Wang, Qibing Ren, Junchi Yan, Xiaokang Yang | Published: 2021-12-28 | Updated: 2022-06-04
Algorithm Design
Robustness Evaluation
Adversarial Attack Methods

MPCLeague: Robust MPC Platform for Privacy-Preserving Machine Learning

Authors: Ajith Suresh | Published: 2021-12-26
Algorithm Design
Membership Inference
Communication Model

HyObscure: Hybrid Obscuring for Privacy-Preserving Data Publishing

Authors: Xiao Han, Yuncong Yang, Junjie Wu | Published: 2021-12-15
Algorithm Design
Data Obfuscation
Privacy Risk Management

Does Fully Homomorphic Encryption Need Compute Acceleration?

Authors: Leo de Castro, Rashmi Agrawal, Rabia Yazicigil, Anantha Chandrakasan, Vinod Vaikuntanathan, Chiraag Juvekar, Ajay Joshi | Published: 2021-12-13 | Updated: 2021-12-14
Algorithm Design
Memory Management Method
Communication Efficiency