Training Protocol

Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning

Authors: Tanveer Khan, Mindaugas Budzys, Antonis Michalas | Published: 2024-04-14
Watermarking
Training Protocol
Privacy Protection Method

Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption

Authors: Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu | Published: 2024-03-17
Training Protocol
Privacy Protection Method
Federated Learning

PrivateLoRA For Efficient Privacy Preserving LLM

Authors: Yiming Wang, Yu Lin, Xiaodong Zeng, Guannan Zhang | Published: 2023-11-23
Training Protocol
Privacy Protection
Membership Inference

SecureBERT and LLAMA 2 Empowered Control Area Network Intrusion Detection and Classification

Authors: Xuemei Li, Huirong Fu | Published: 2023-11-19
Training Protocol
Model Architecture
Intrusion Detection System

Quadratic Functional Encryption for Secure Training in Vertical Federated Learning

Authors: Shuangyi Chen, Anuja Modi, Shweta Agrawal, Ashish Khisti | Published: 2023-05-15 | Updated: 2023-06-19
DNN IP Protection Method
Training Protocol
Privacy Protection Method

Killing Two Birds with One Stone: Quantization Achieves Privacy in Distributed Learning

Authors: Guangfeng Yan, Tan Li, Kui Wu, Linqi Song | Published: 2023-04-26
DNN IP Protection Method
Training Protocol
Privacy Technique

A Security Verification Framework of Cryptographic Protocols Using Machine Learning

Authors: Kentaro Ohno, Misato Nakabayashi | Published: 2023-04-26
Security Analysis
Training Protocol
Prototype Network

Reconstruction-based LSTM-Autoencoder for Anomaly-based DDoS Attack Detection over Multivariate Time-Series Data

Authors: Yuanyuan Wei, Julian Jang-Jaccard, Fariza Sabrina, Wen Xu, Seyit Camtepe, Aeryn Dunmore | Published: 2023-04-21
DDoS Attack Detection
Training Protocol
Anomaly Detection Method

Improving Multilayer-Perceptron(MLP)-based Network Anomaly Detection with Birch Clustering on CICIDS-2017 Dataset

Authors: Yuhua Yin, Julian Jang-Jaccard, Fariza Sabrina, Jin Kwak | Published: 2022-08-20 | Updated: 2022-10-30
Training Protocol
Attack Detection
Machine Learning Technology

Private, Efficient, and Accurate: Protecting Models Trained by Multi-party Learning with Differential Privacy

Authors: Wenqiang Ruan, Mingxin Xu, Wenjing Fang, Li Wang, Lei Wang, Weili Han | Published: 2022-08-18
Training Protocol
Privacy Risk Management
Communication Efficiency