Training Protocol

SEDML: Securely and Efficiently Harnessing Distributed Knowledge in Machine Learning

Authors: Yansong Gao, Qun Li, Yifeng Zheng, Guohong Wang, Jiannan Wei, Mang Su | Published: 2021-10-26
Characteristics of RDP
Training Protocol
Privacy Protection Mechanism

“Adversarial Examples” for Proof-of-Learning

Authors: Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wu, Qingbiao Wang, Kui Ren | Published: 2021-08-21 | Updated: 2022-04-05
Algorithm
Training Protocol
Adversarial Example

Neural Networks with Recurrent Generative Feedback

Authors: Yujia Huang, James Gornet, Sihui Dai, Zhiding Yu, Tan Nguyen, Doris Y. Tsao, Anima Anandkumar | Published: 2020-07-17 | Updated: 2020-11-10
Training Protocol
Deep Learning
Generative Model Characteristics

Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware

Authors: James Baldwin, Ali Dehghantanha | Published: 2018-07-27
Training Protocol
Model Evaluation
Feature Selection Method