A Large-Scale Database for Graph Representation Learning Authors: Scott Freitas, Yuxiao Dong, Joshua Neil, Duen Horng Chau | Published: 2020-11-16 | Updated: 2021-11-07 Dataset GenerationPerformance EvaluationMalware Detection Method 2020.11.16 2025.05.28 Literature Database
Power Side-Channel Attacks on BNN Accelerators in Remote FPGAs Authors: Shayan Moini, Shanquan Tian, Jakub Szefer, Daniel Holcomb, Russell Tessier | Published: 2020-11-15 | Updated: 2021-04-18 WatermarkingPerformance EvaluationAttack Type 2020.11.15 2025.05.28 Literature Database
The Cost of Privacy in Generalized Linear Models: Algorithms and Minimax Lower Bounds Authors: T. Tony Cai, Yichen Wang, Linjun Zhang | Published: 2020-11-08 | Updated: 2020-12-06 Data Privacy AssessmentPerformance EvaluationSelection and Evaluation of Optimization Algorithms 2020.11.08 2025.05.28 Literature Database
Enabling Fast Differentially Private SGD via Just-in-Time Compilation and Vectorization Authors: Pranav Subramani, Nicholas Vadivelu, Gautam Kamath | Published: 2020-10-18 | Updated: 2021-10-26 DP-SGDPerformance EvaluationOptimization Methods 2020.10.18 2025.05.28 Literature Database
BlockFLow: An Accountable and Privacy-Preserving Solution for Federated Learning Authors: Vaikkunth Mugunthan, Ravi Rahman, Lalana Kagal | Published: 2020-07-08 Performance EvaluationPrivacy AssessmentAttack Pattern Extraction 2020.07.08 2025.05.28 Literature Database
Adversarial Self-Supervised Contrastive Learning Authors: Minseon Kim, Jihoon Tack, Sung Ju Hwang | Published: 2020-06-13 | Updated: 2020-10-26 Performance EvaluationPoisoningAdversarial Attack Detection 2020.06.13 2025.05.28 Literature Database
Backdoor Smoothing: Demystifying Backdoor Attacks on Deep Neural Networks Authors: Kathrin Grosse, Taesung Lee, Battista Biggio, Youngja Park, Michael Backes, Ian Molloy | Published: 2020-06-11 | Updated: 2021-11-02 Backdoor AttackPerformance EvaluationAttack Scenario Analysis 2020.06.11 2025.05.28 Literature Database
Interpolation between Residual and Non-Residual Networks Authors: Zonghan Yang, Yang Liu, Chenglong Bao, Zuoqiang Shi | Published: 2020-06-10 | Updated: 2020-08-16 AlgorithmPerformance EvaluationImprovement of Learning 2020.06.10 2025.05.28 Literature Database
AutoPrivacy: Automated Layer-wise Parameter Selection for Secure Neural Network Inference Authors: Qian Lou, Song Bian, Lei Jiang | Published: 2020-06-07 | Updated: 2020-10-15 Performance EvaluationPrivacy AssessmentEncryption Method 2020.06.07 2025.05.28 Literature Database
COVID-19 and Your Smartphone: BLE-based Smart Contact Tracing Authors: Pai Chet Ng, Petros Spachos, Konstantinos Plataniotis | Published: 2020-05-28 Performance EvaluationPrivacy AssessmentMachine Learning 2020.05.28 2025.05.28 Literature Database