Data Integrity Constraints

CaFA: Cost-aware, Feasible Attacks With Database Constraints Against Neural Tabular Classifiers

Authors: Matan Ben-Tov, Daniel Deutch, Nave Frost, Mahmood Sharif | Published: 2025-01-17
Data Integrity Constraints
Experimental Validation
Adversarial Example

Information-Theoretically Private Federated Submodel Learning with Storage Constrained Databases

Authors: Sajani Vithana, Sennur Ulukus | Published: 2023-07-12
Algorithm Design
Data Integrity Constraints
Efficiency Evaluation

Externally validating the IoTDevID device identification methodology using the CIC IoT 2022 Dataset

Authors: Kahraman Kostas, Mike Just, Michael A. Lones | Published: 2023-07-03
Dataset Generation
Data Integrity Constraints
Machine Learning Method

EIFFeL: Ensuring Integrity for Federated Learning

Authors: Amrita Roy Chowdhury, Chuan Guo, Somesh Jha, Laurens van der Maaten | Published: 2021-12-23 | Updated: 2022-09-12
Data Integrity Constraints
Privacy Protection
Malicious Client

Differential Privacy in Privacy-Preserving Big Data and Learning: Challenge and Opportunity

Authors: Honglu Jiang, Yifeng Gao, S M Sarwar, Luis GarzaPerez, Mahmudul Robin | Published: 2021-12-03
LDP Mechanism
Data Integrity Constraints
Privacy Risk Management

Needle in a Haystack: Detecting Subtle Malicious Edits to Additive Manufacturing G-code Files

Authors: Caleb Beckwith, Harsh Sankar Naicker, Svara Mehta, Viba R. Udupa, Nghia Tri Nim, Varun Gadre, Hammond Pearce, Gary Mac, Nikhil Gupta | Published: 2021-11-24
Dataset evaluation
Data Integrity Constraints
Machine Learning Application

QUDOS: Quorum-Based Cloud-Edge Distributed DNNs for Security Enhanced Industry 4.0

Authors: Kevin Wallis, Christoph Reich, Blesson Varghese, Christian Schindelhauer | Published: 2021-11-09
Data Integrity Constraints
Efficiency of Distributed Learning
Defense Mechanism

On the Robustness of Domain Constraints

Authors: Ryan Sheatsley, Blaine Hoak, Eric Pauley, Yohan Beugin, Michael J. Weisman, Patrick McDaniel | Published: 2021-05-18 | Updated: 2021-11-07
Data Integrity Constraints
Membership Inference
Adversarial Learning

Privacy and Integrity Preserving Training Using Trusted Hardware

Authors: Hanieh Hashemi, Yongqin Wang, Murali Annavaram | Published: 2021-05-01
Data Privacy Assessment
Data Integrity Constraints
Privacy Protection

Perun: Secure Multi-Stakeholder Machine Learning Framework with GPU Support

Authors: Wojciech Ozga, Do Le Quoc, Christof Fetzer | Published: 2021-03-31
Security label
Data Protection Method
Data Integrity Constraints