A General Recipe for Contractive Graph Neural Networks — Technical Report Authors: Maya Bechler-Speicher, Moshe Eliasof | Published: 2024-11-04 AlgorithmConvergence AnalysisRegularization 2024.11.04 2025.05.27 Literature Database
Encryption-Friendly LLM Architecture Authors: Donghwan Rho, Taeseong Kim, Minje Park, Jung Woo Kim, Hyunsik Chae, Jung Hee Cheon, Ernest K. Ryu | Published: 2024-10-03 AlgorithmExperimental Validation 2024.10.03 2025.05.27 Literature Database
A novel application of Shapley values for large multidimensional time-series data: Applying explainable AI to a DNA profile classification neural network Authors: Lauren Elborough, Duncan Taylor, Melissa Humphries | Published: 2024-09-26 AlgorithmWatermarkingEvaluation Method 2024.09.26 2025.05.27 Literature Database
Using Large Language Models for Template Detection from Security Event Logs Authors: Risto Vaarandi, Hayretdin Bahsi | Published: 2024-09-08 | Updated: 2025-04-14 LLM Performance EvaluationAlgorithmEvaluation Method 2024.09.08 2025.05.27 Literature Database
Training quantum machine learning models on cloud without uploading the data Authors: Guang Ping He | Published: 2024-09-06 | Updated: 2024-10-07 AlgorithmWatermarkingQuantum Framework 2024.09.06 2025.05.27 Literature Database
Robust Q-Learning under Corrupted Rewards Authors: Sreejeet Maity, Aritra Mitra | Published: 2024-09-05 AlgorithmConvergence GuaranteeReinforcement Learning 2024.09.05 2025.05.27 Literature Database
Private Counting of Distinct Elements in the Turnstile Model and Extensions Authors: Monika Henzinger, A. R. Sricharan, Teresa Anna Steiner | Published: 2024-08-21 AlgorithmPrivacy Protection Method 2024.08.21 2025.05.27 Literature Database
Regularization for Adversarial Robust Learning Authors: Jie Wang, Rui Gao, Yao Xie | Published: 2024-08-19 | Updated: 2024-08-22 AlgorithmPoisoningRegularization 2024.08.19 2025.05.27 Literature Database
Fast John Ellipsoid Computation with Differential Privacy Optimization Authors: Jiuxiang Gu, Xiaoyu Li, Yingyu Liang, Zhenmei Shi, Zhao Song, Junwei Yu | Published: 2024-08-12 AlgorithmPrivacy Protection MethodConvergence Guarantee 2024.08.12 2025.05.27 Literature Database
Malicious Internet Entity Detection Using Local Graph Inference Authors: Simon Mandlik, Tomas Pevny, Vaclav Smidl, Lukas Bajer | Published: 2024-08-06 | Updated: 2024-08-07 AlgorithmGraph TransformationEvaluation Method 2024.08.06 2025.05.27 Literature Database