Algorithm

Tolerating Adversarial Attacks and Byzantine Faults in Distributed Machine Learning

Authors: Yusen Wu, Hao Chen, Xin Wang, Chao Liu, Phuong Nguyen, Yelena Yesha | Published: 2021-09-05
Algorithm
Distributed Learning
Machine Learning Method

EG-Booster: Explanation-Guided Booster of ML Evasion Attacks

Authors: Abderrahmen Amich, Birhanu Eshete | Published: 2021-08-31 | Updated: 2021-09-02
Algorithm
Adversarial Example
Machine Learning Method

Semantic-Preserving Adversarial Text Attacks

Authors: Xinghao Yang, Weifeng Liu, James Bailey, Dacheng Tao, Wei Liu | Published: 2021-08-23 | Updated: 2023-03-03
Algorithm
Text Generation Method
Adversarial Example

“Adversarial Examples” for Proof-of-Learning

Authors: Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wu, Qingbiao Wang, Kui Ren | Published: 2021-08-21 | Updated: 2022-04-05
Algorithm
Training Protocol
Adversarial Example

OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

Authors: Pengcheng Jiang, Kenji Tei | Published: 2021-08-16 | Updated: 2021-11-02
Algorithm
Module Reconfiguration
Computational Efficiency

Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption

Authors: Dimitris Stripelis, Hamza Saleem, Tanmay Ghai, Nikhil Dhinagar, Umang Gupta, Chrysovalantis Anastasiou, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, Jose Luis Ambite | Published: 2021-08-07 | Updated: 2021-11-09
Algorithm
Poisoning
Federated Learning

Derivative-free Alternating Projection Algorithms for General Nonconvex-Concave Minimax Problems

Authors: Zi Xu, Ziqi Wang, Jingjing Shen, Yuhong Dai | Published: 2021-08-01 | Updated: 2024-01-25
Algorithm
Hyperparameter Optimization
Machine Learning Algorithm

A Decentralized Federated Learning Framework via Committee Mechanism with Convergence Guarantee

Authors: Chunjiang Che, Xiaoli Li, Chuan Chen, Xiaoyu He, Zibin Zheng | Published: 2021-08-01 | Updated: 2022-09-08
Algorithm
Robustness
Federated Learning

PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase

Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29
Algorithm
Machine Learning Algorithm
Face Recognition System

Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications

Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15
Algorithm
Experimental Validation
Watermark Robustness