Unrolling SGD: Understanding Factors Influencing Machine Unlearning Authors: Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-09-27 | Updated: 2022-03-02 AlgorithmPerformance EvaluationRegularization 2021.09.27 2025.05.28 Literature Database
Differentially Private Aggregation in the Shuffle Model: Almost Central Accuracy in Almost a Single Message Authors: Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Rasmus Pagh, Amer Sinha | Published: 2021-09-27 AlgorithmData Privacy AssessmentPrivacy Risk Management 2021.09.27 2025.05.28 Literature Database
Morse-STF: Improved Protocols for Privacy-Preserving Machine Learning Authors: Qizhi Zhang, Sijun Tan, Lichun Li, Yun Zhao, Dong Yin, Shan Yin | Published: 2021-09-24 | Updated: 2022-05-19 AlgorithmMachine Learning ApplicationLinear Model 2021.09.24 2025.05.28 Literature Database
A Novel Open Set Energy-based Flow Classifier for Network Intrusion Detection Authors: Manuela M. C. Souza, Camila Pontes, Joao Gondim, Luis P. F. Garcia, Luiz DaSilva, Marcelo A. Marotta | Published: 2021-09-23 | Updated: 2022-04-26 AlgorithmEnergy ManagementPerformance Evaluation 2021.09.23 2025.05.28 Literature Database
Secure PAC Bayesian Regression via Real Shamir Secret Sharing Authors: Jaron Skovsted Gundersen, Bulut Kuskonmaz, Rafael Wisniewski | Published: 2021-09-23 | Updated: 2023-04-17 AlgorithmPrivacy Risk ManagementLinear Model 2021.09.23 2025.05.28 Literature Database
Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08 AlgorithmCybersecurityData Leakage 2021.09.20 2025.05.28 Literature Database
The mathematics of adversarial attacks in AI — Why deep learning is unstable despite the existence of stable neural networks Authors: Alexander Bastounis, Anders C Hansen, Verner Vlačić | Published: 2021-09-13 | Updated: 2025-03-26 AlgorithmGeneralization PerformanceAdversarial Learning 2021.09.13 2025.05.28 Literature Database
Differential Privacy in Personalized Pricing with Nonparametric Demand Models Authors: Xi Chen, Sentao Miao, Yining Wang | Published: 2021-09-10 AlgorithmData Privacy AssessmentPrivacy Risk Management 2021.09.10 2025.05.28 Literature Database
Social Media Monitoring for IoT Cyber-Threats Authors: Sofia Alevizopoulou, Paris Koloveas, Christos Tryfonopoulos, Paraskevi Raftopoulou | Published: 2021-09-09 AlgorithmCybersecurityVulnerability Management 2021.09.09 2025.05.28 Literature Database
Encryption and Real Time Decryption for protecting Machine Learning models in Android Applications Authors: Aryan Verma | Published: 2021-09-06 AlgorithmModel Protection MethodsEncryption Technology 2021.09.06 2025.05.28 Literature Database