Decomposing and Editing Predictions by Modeling Model Computation Authors: Harshay Shah, Andrew Ilyas, Aleksander Madry | Published: 2024-04-17 WatermarkingModel InterpretabilityModel editing techniques 2024.04.17 2025.05.27 Literature Database
OmniLytics+: A Secure, Efficient, and Affordable Blockchain Data Market for Machine Learning through Off-Chain Processing Authors: Songze Li, Mingzhe Liu, Mengqi Chen | Published: 2024-04-17 WatermarkingPrivacy Protection MethodBlockchain Technology 2024.04.17 2025.05.27 Literature Database
Federated Learning on Riemannian Manifolds with Differential Privacy Authors: Zhenwei Huang, Wen Huang, Pratik Jawanpuria, Bamdev Mishra | Published: 2024-04-15 WatermarkingPrivacy Protection MethodConvergence Analysis 2024.04.15 2025.05.27 Literature Database
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning Authors: Tanveer Khan, Mindaugas Budzys, Antonis Michalas | Published: 2024-04-14 WatermarkingTraining ProtocolPrivacy Protection Method 2024.04.14 2025.05.27 Literature Database
Empowering Malware Detection Efficiency within Processing-in-Memory Architecture Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12 WatermarkingMalware ClassificationComputational Efficiency 2024.04.12 2025.05.27 Literature Database
A Survey on Security of Ultra/Hyper Reliable Low Latency Communication: Recent Advancements, Challenges, and Future Directions Authors: Annapurna Pradhan, Susmita Das, Md. Jalil Piran, Zhu Han | Published: 2024-04-11 WatermarkingSecurity of Signal TransmissionPhysical layer security 2024.04.11 2025.05.27 Literature Database
Enhancing Network Intrusion Detection Performance using Generative Adversarial Networks Authors: Xinxing Zhao, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingCybersecurityDataset Generation 2024.04.11 2025.05.27 Literature Database
Privacy preserving layer partitioning for Deep Neural Network models Authors: Kishore Rajasekar, Randolph Loh, Kar Wai Fok, Vrizlynn L. L. Thing | Published: 2024-04-11 WatermarkingPrivacy Protection MethodComputational Efficiency 2024.04.11 2025.05.27 Literature Database
Case Study: Neural Network Malware Detection Verification for Feature and Image Datasets Authors: Preston K. Robinette, Diego Manzanas Lopez, Serena Serbinowska, Kevin Leach, Taylor T. Johnson | Published: 2024-04-08 WatermarkingMalware ClassificationEvaluation Method 2024.04.08 2025.05.27 Literature Database
BruSLeAttack: A Query-Efficient Score-Based Black-Box Sparse Adversarial Attack Authors: Viet Quoc Vo, Ehsan Abbasnejad, Damith C. Ranasinghe | Published: 2024-04-08 | Updated: 2024-06-01 WatermarkingAttack MethodAdversarial Example 2024.04.08 2025.05.27 Literature Database