Estimation of conditional average treatment effects on distributed confidential data Authors: Yuji Kawamata, Ryoki Motai, Yukihiko Okada, Akira Imakura, Tetsuya Sakurai | Published: 2024-02-05 | Updated: 2024-09-10 WatermarkingSimulation Result EvaluationData Generation 2024.02.05 2025.05.27 Literature Database
A Review and Comparison of AI Enhanced Side Channel Analysis Authors: Max Panoff, Honggang Yu, Haoqi Shan, Yier Jin | Published: 2024-02-03 WatermarkingCybersecurityDeep Learning Method 2024.02.03 2025.05.27 Literature Database
Salsa Fresca: Angular Embeddings and Pre-Training for ML Attacks on Learning With Errors Authors: Samuel Stevens, Emily Wenger, Cathy Li, Niklas Nolte, Eshika Saxena, François Charton, Kristin Lauter | Published: 2024-02-02 WatermarkingModel Design 2024.02.02 2025.05.27 Literature Database
Domain-Independent Deception: A New Taxonomy and Linguistic Analysis Authors: Rakesh M. Verma, Nachum Dershowitz, Victor Zeng, Dainis Boumber, Xuting Liu | Published: 2024-02-01 WatermarkingDomain IndependenceBias 2024.02.01 2025.05.27 Literature Database
Comparing Spectral Bias and Robustness For Two-Layer Neural Networks: SGD vs Adaptive Random Fourier Features Authors: Aku Kammonen, Lisi Liang, Anamika Pandey, Raúl Tempone | Published: 2024-02-01 WatermarkingBiasAdversarial Attack Detection 2024.02.01 2025.05.27 Literature Database
BrainLeaks: On the Privacy-Preserving Properties of Neuromorphic Architectures against Model Inversion Attacks Authors: Hamed Poursiami, Ihsen Alouani, Maryam Parsa | Published: 2024-02-01 | Updated: 2024-05-07 WatermarkingPrivacy ProtectionMembership Inference 2024.02.01 2025.05.27 Literature Database
opML: Optimistic Machine Learning on Blockchain Authors: KD Conway, Cathie So, Xiaohang Yu, Kartin Wong | Published: 2024-01-31 | Updated: 2024-02-05 WatermarkingBlockchain TechnologyMachine Learning Method 2024.01.31 2025.05.27 Literature Database
Game-Theoretic Unlearnable Example Generator Authors: Shuang Liu, Yihan Wang, Xiao-Shan Gao | Published: 2024-01-31 WatermarkingBackdoor AttackPoisoning 2024.01.31 2025.05.27 Literature Database
Systematically Assessing the Security Risks of AI/ML-enabled Connected Healthcare Systems Authors: Mohammed Elnawawy, Mohammadreza Hallajiyan, Gargi Mitra, Shahrear Iqbal, Karthik Pattabiraman | Published: 2024-01-30 | Updated: 2024-04-12 WatermarkingRisk ManagementThreats of Medical AI 2024.01.30 2025.05.27 Literature Database
Data-Oblivious ML Accelerators using Hardware Security Extensions Authors: Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan | Published: 2024-01-29 FPGAWatermarkingData Protection Method 2024.01.29 2025.05.27 Literature Database