Ransomware Detection using Process Memory Authors: Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter | Published: 2022-03-31 AlgorithmData PreprocessingMachine Learning 2022.03.31 2025.05.28 Literature Database
Facial Information Analysis Technology for Gender and Age Estimation Authors: Gilheum Park, Sua Jung | Published: 2021-11-17 AlgorithmMachine LearningAttack that Analyzes Images with AI to Infer Personal Information 2021.11.17 2025.05.28 Literature Database
An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy Authors: Daniel Fraunholz, Marc Zimmermann, Hans D. Schotten | Published: 2021-11-06 ICS Honeypot DevelopmentAlgorithmAdaptive Adversarial Training 2021.11.06 2025.05.28 Literature Database
Two-Bit Aggregation for Communication Efficient and Differentially Private Federated Learning Authors: Mohammad Aghapour, Aidin Ferdowsi, Walid Saad | Published: 2021-10-06 AlgorithmPrivacy Risk ManagementFederated Learning 2021.10.06 2025.05.28 Literature Database
Task-aware Privacy Preservation for Multi-dimensional Data Authors: Jiangnan Cheng, Ao Tang, Sandeep Chinchali | Published: 2021-10-05 | Updated: 2022-08-08 AlgorithmPrivacy Risk ManagementPerformance Evaluation 2021.10.05 2025.05.28 Literature Database
Machine learning attack on copy detection patterns: are 1×1 patterns cloneable? Authors: Roman Chaban, Olga Taran, Joakim Tutt, Taras Holotyak, Slavi Bonev, Slava Voloshynovskiy | Published: 2021-10-05 | Updated: 2021-10-06 AlgorithmData GenerationPerformance Evaluation 2021.10.05 2025.05.28 Literature Database
Label differential privacy via clustering Authors: Hossein Esfandiari, Vahab Mirrokni, Umar Syed, Sergei Vassilvitskii | Published: 2021-10-05 AlgorithmData Privacy AssessmentPrivacy Risk Management 2021.10.05 2025.05.28 Literature Database
An energy-based model for neuro-symbolic reasoning on knowledge graphs Authors: Dominik Dold, Josep Soler Garrido | Published: 2021-10-04 AlgorithmPerformance EvaluationMachine Learning Application 2021.10.04 2025.05.28 Literature Database
Secure Machine Learning over Relational Data Authors: Qiyao Luo, Yilei Wang, Zhenghang Ren, Ke Yi, Kai Chen, Xiao Wang | Published: 2021-09-30 AlgorithmData Privacy AssessmentMembership Inference 2021.09.30 2025.05.28 Literature Database
BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining Authors: Weizhe Hua, Yichi Zhang, Chuan Guo, Zhiru Zhang, G. Edward Suh | Published: 2021-09-29 | Updated: 2021-12-05 AlgorithmRobustnessHigh Difficulty Sample 2021.09.29 2025.05.28 Literature Database