Mitigating Leakage from Data Dependent Communications in Decentralized Computing using Differential Privacy Authors: Riad Ladjel, Nicolas Anciaux, Aurélien Bellet, Guillaume Scerri | Published: 2021-12-23 Data DependencyPrivacy ProtectionCommunication Efficiency 2021.12.23 2025.05.28 Literature Database
Fully Homomorphically Encrypted Deep Learning as a Service Authors: George Onoufriou, Paul Mayfield, Georgios Leontidis | Published: 2021-07-26 AlgorithmData DependencyPrivacy Leakage 2021.07.26 2025.05.28 Literature Database
Towards Improving the Trustworthiness of Hardware based Malware Detector using Online Uncertainty Estimation Authors: Harshit Kumar, Nikhil Chawla, Saibal Mukhopadhyay | Published: 2021-03-21 CybersecurityData DependencyQuantification of Uncertainty 2021.03.21 2025.05.28 Literature Database
DDUO: General-Purpose Dynamic Analysis for Differential Privacy Authors: Chike Abuah, Alex Silence, David Darais, Joe Near | Published: 2021-03-16 Data DependencyPrivacy Risk ManagementDynamic Analysis 2021.03.16 2025.05.28 Literature Database
Proof-of-Learning: Definitions and Practice Authors: Hengrui Jia, Mohammad Yaghini, Christopher A. Choquette-Choo, Natalie Dullerud, Anvith Thudi, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-03-09 Data DependencyModel Performance EvaluationAdversarial attack 2021.03.09 2025.05.28 Literature Database
Smoothness Analysis of Adversarial Training Authors: Sekitoshi Kanai, Masanori Yamada, Hiroshi Takahashi, Yuki Yamanaka, Yasutoshi Ida | Published: 2021-03-02 | Updated: 2023-03-06 Data DependencyAdversarial ExampleAdversarial Spectrum Attack Detection 2021.03.02 2025.05.28 Literature Database
Protecting the integrity of the training procedure of neural networks Authors: Christian Berghoff | Published: 2020-05-14 Data DependencyTraining MethodMachine Learning Algorithm 2020.05.14 2025.05.28 Literature Database
Data Augmentation for Deep Candlestick Learner Authors: Chia-Ying Tsao, Jun-Hao Chen, Samuel Yen-Chi Chen, Yun-Cheng Tsai | Published: 2020-05-14 | Updated: 2020-05-29 Candlestick PatternData DependencyMachine Learning Application 2020.05.14 2025.05.28 Literature Database
Anomaly-based Intrusion Detection in Industrial Data with SVM and Random Forests Authors: Simon D. Duque Anton, Sapna Sinha, Hans Dieter Schotten | Published: 2019-07-24 ML-Based IDSData DependencyFeature Interdependence 2019.07.24 2025.05.28 Literature Database
A Conceptual Architecture for Contractual Data Sharing in a Decentralised Environment Authors: Iain Barclay, Alun Preece, Ian Taylor, Dinesh Verma | Published: 2019-04-05 Data Origins and EvolutionData DependencyMachine Learning Application 2019.04.05 2025.05.28 Literature Database