Anomaly detection optimization using big data and deep learning to reduce false-positive Authors: Khloud Al Jallad, Mohamad Aljnidi, Mohammad Said Desouki | Published: 2022-09-28 Security labelData Protection MethodDeep Learning Method 2022.09.28 2025.05.28 Literature Database
Machine Learning with Confidential Computing: A Systematization of Knowledge Authors: Fan Mo, Zahra Tarkhani, Hamed Haddadi | Published: 2022-08-22 | Updated: 2024-06-03 TEE ImplementationData Protection MethodMembership Inference 2022.08.22 2025.05.28 Literature Database
Label Flipping Data Poisoning Attack Against Wearable Human Activity Recognition System Authors: Abdur R. Shahid, Ahmed Imteaj, Peter Y. Wu, Diane A. Igoche, Tauhidul Alam | Published: 2022-08-17 Data Protection MethodPoisoningAttack Detection 2022.08.17 2025.05.28 Literature Database
Practical Vertical Federated Learning with Unsupervised Representation Learning Authors: Zhaomin Wu, Qinbin Li, Bingsheng He | Published: 2022-08-13 Data Protection MethodPrivacy Risk ManagementCommunication Efficiency 2022.08.13 2025.05.28 Literature Database
SecFL: Confidential Federated Learning using TEEs Authors: Do Le Quoc, Christof Fetzer | Published: 2021-10-03 | Updated: 2021-10-07 Data Protection MethodPrivacy Risk ManagementFederated Learning 2021.10.03 2025.05.28 Literature Database
Citadel: Protecting Data Privacy and Model Confidentiality for Collaborative Learning with SGX Authors: Chengliang Zhang, Junzhe Xia, Baichen Yang, Huancheng Puyang, Wei Wang, Ruichuan Chen, Istemi Ekin Akkus, Paarijaat Aditya, Feng Yan | Published: 2021-05-04 | Updated: 2021-11-08 Data Privacy AssessmentData Protection MethodPrivacy Protection 2021.05.04 2025.05.28 Literature Database
Quantifying the Tradeoff Between Cybersecurity and Location Privacy Authors: Dajiang Suo, M. Elena Renda, Jinhua Zhao | Published: 2021-05-04 | Updated: 2021-12-10 Data Privacy AssessmentData Protection MethodPrivacy Protection 2021.05.04 2025.05.28 Literature Database
GRNN: Generative Regression Neural Network — A Data Leakage Attack for Federated Learning Authors: Hanchi Ren, Jingjing Deng, Xianghua Xie | Published: 2021-05-02 | Updated: 2022-09-12 Data Protection MethodVisual Similarity DetectionFace Recognition System 2021.05.02 2025.05.28 Literature Database
Influence Based Defense Against Data Poisoning Attacks in Online Learning Authors: Sanjay Seetharaman, Shubham Malaviya, Rosni KV, Manish Shukla, Sachin Lodha | Published: 2021-04-24 Data Protection MethodPoisoningDefense Mechanism 2021.04.24 2025.05.28 Literature Database
Secure Human Action Recognition by Encrypted Neural Network Inference Authors: Miran Kim, Xiaoqian Jiang, Kristin Lauter, Elkhan Ismayilzada, Shayan Shams | Published: 2021-04-19 | Updated: 2022-08-09 Data Protection MethodData Management SystemEncryption Technology 2021.04.19 2025.05.28 Literature Database