On the Difficulty of Membership Inference Attacks Authors: Shahbaz Rezaei, Xin Liu | Published: 2020-05-27 | Updated: 2021-03-22 Performance EvaluationAttack EvaluationMachine Learning 2020.05.27 2025.05.28 Literature Database
A Framework for Behavioral Biometric Authentication using Deep Metric Learning on Mobile Devices Authors: Cong Wang, Yanru Xiao, Xing Gao, Li Li, Jun Wang | Published: 2020-05-26 | Updated: 2020-08-17 Performance EvaluationPoisoningMachine Learning Technology 2020.05.26 2025.05.28 Literature Database
Clonability of anti-counterfeiting printable graphical codes: a machine learning approach Authors: Olga Taran, Slavi Bonev, Slava Voloshynovskiy | Published: 2019-03-18 Performance EvaluationAdversarial Attack DetectionDeep Learning Model 2019.03.18 2025.05.28 Literature Database
Identifying Malicious Web Domains Using Machine Learning Techniques with Online Credibility and Performance Data Authors: Zhongyi Hu, Raymond Chiong, Ilung Pranata, Willy Susilo, Yukun Bao | Published: 2019-02-23 Performance EvaluationPhishing DetectionPoisoning 2019.02.23 2025.05.28 Literature Database
Optimizing Stochastic Gradient Descent in Text Classification Based on Fine-Tuning Hyper-Parameters Approach. A Case Study on Automatic Classification of Global Terrorist Attacks Authors: Shadi Diab | Published: 2019-02-18 | Updated: 2019-02-23 Data PreprocessingPerformance EvaluationClassification Pattern Analysis 2019.02.18 2025.05.28 Literature Database
TensorSCONE: A Secure TensorFlow Framework using Intel SGX Authors: Roland Kunkel, Do Le Quoc, Franz Gregor, Sergei Arnautov, Pramod Bhatotia, Christof Fetzer | Published: 2019-02-12 Performance EvaluationThreat ModelWatermarking Technology 2019.02.12 2025.05.28 Literature Database
Reaching Data Confidentiality and Model Accountability on the CalTrain Authors: Zhongshu Gu, Hani Jamjoom, Dong Su, Heqing Huang, Jialong Zhang, Tengfei Ma, Dimitrios Pendarakis, Ian Molloy | Published: 2018-12-07 Trigger DetectionPerformance EvaluationFederated Learning 2018.12.07 2025.05.28 Literature Database
Three Tools for Practical Differential Privacy Authors: Koen Lennart van der Veen, Ruben Seggers, Peter Bloem, Giorgio Patrini | Published: 2018-12-07 Hyperparameter OptimizationPerformance EvaluationDifferential Privacy 2018.12.07 2025.05.28 Literature Database
When Homomorphic Cryptosystem Meets Differential Privacy: Training Machine Learning Classifier with Privacy Protection Authors: Xiangyun Tang, Liehuang Zhu, Meng Shen, Xiaojiang Du | Published: 2018-12-06 Performance EvaluationPrivacy ProtectionDifferential Privacy 2018.12.06 2025.05.28 Literature Database
A lightweight MapReduce framework for secure processing with SGX Authors: Rafael Pires, Daniel Gavril, Pascal Felber, Emanuel Onica, Marcelo Pasin | Published: 2017-05-16 Data-Driven ClusteringPerformance EvaluationPrivacy-Preserving Algorithm 2017.05.16 2025.05.28 Literature Database