SEDML: Securely and Efficiently Harnessing Distributed Knowledge in Machine Learning Authors: Yansong Gao, Qun Li, Yifeng Zheng, Guohong Wang, Jiannan Wei, Mang Su | Published: 2021-10-26 Characteristics of RDPTraining ProtocolPrivacy Protection Mechanism 2021.10.26 2025.05.28 Literature Database
“Adversarial Examples” for Proof-of-Learning Authors: Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wu, Qingbiao Wang, Kui Ren | Published: 2021-08-21 | Updated: 2022-04-05 AlgorithmTraining ProtocolAdversarial Example 2021.08.21 2025.05.28 Literature Database
Neural Networks with Recurrent Generative Feedback Authors: Yujia Huang, James Gornet, Sihui Dai, Zhiding Yu, Tan Nguyen, Doris Y. Tsao, Anima Anandkumar | Published: 2020-07-17 | Updated: 2020-11-10 Training ProtocolDeep LearningGenerative Model Characteristics 2020.07.17 2025.05.28 Literature Database
Leveraging Support Vector Machine for Opcode Density Based Detection of Crypto-Ransomware Authors: James Baldwin, Ali Dehghantanha | Published: 2018-07-27 Training ProtocolModel EvaluationFeature Selection Method 2018.07.27 2025.05.28 Literature Database