Privacy Amplification for Matrix Mechanisms Authors: Christopher A. Choquette-Choo, Arun Ganesh, Thomas Steinke, Abhradeep Thakurta | Published: 2023-10-24 | Updated: 2024-05-04 Data GenerationPrivacy TechniqueModel Design 2023.10.24 2025.05.28 Literature Database
Towards the Theory of Unsupervised Federated Learning: Non-asymptotic Analysis of Federated EM Algorithms Authors: Ye Tian, Haolei Weng, Yang Feng | Published: 2023-10-23 | Updated: 2024-06-14 Model DesignConvergence GuaranteeOptimization Methods 2023.10.23 2025.05.28 Literature Database
B^2SFL: A Bi-level Blockchained Architecture for Secure Federated Learning-based Traffic Prediction Authors: Hao Guo, Collin Meese, Wanxin Li, Chien-Chung Shen, Mark Nejad | Published: 2023-10-23 Privacy TechniqueModel DesignMachine Learning Method 2023.10.23 2025.05.28 Literature Database
REMARK-LLM: A Robust and Efficient Watermarking Framework for Generative Large Language Models Authors: Ruisi Zhang, Shehzeen Samarah Hussain, Paarth Neekhara, Farinaz Koushanfar | Published: 2023-10-18 | Updated: 2024-04-08 Data GenerationModel DesignMalicious Content Generation 2023.10.18 2025.05.28 Literature Database
The Efficacy of Transformer-based Adversarial Attacks in Security Domains Authors: Kunyang Li, Kyle Domico, Jean-Charles Noirot Ferrand, Patrick McDaniel | Published: 2023-10-17 Security AnalysisModel DesignAdversarial Example 2023.10.17 2025.05.28 Literature Database
Learning The Likelihood Test With One-Class Classifiers for Physical Layer Authentication Authors: Francesco Ardizzon, Stefano Tomasin | Published: 2022-10-22 | Updated: 2024-08-04 Dataset GenerationModel DesignCommunication Model 2022.10.22 2025.05.28 Literature Database
Empowering Graph Representation Learning with Test-Time Graph Transformation Authors: Wei Jin, Tong Zhao, Jiayuan Ding, Yozen Liu, Jiliang Tang, Neil Shah | Published: 2022-10-07 | Updated: 2023-02-26 FrameworkModel DesignFeature Selection Method 2022.10.07 2025.05.28 Literature Database
Network Intrusion Detection System in a Light Bulb Authors: Liam Daly Manocchio, Siamak Layeghy, Marius Portmann | Published: 2022-10-06 IoT Security RisksModel DesignDecision Tree 2022.10.06 2025.05.28 Literature Database
A Closer Look at Robustness to L-infinity and Spatial Perturbations and their Composition Authors: Luke Rowe, Benjamin Thérien, Krzysztof Czarnecki, Hongyang Zhang | Published: 2022-10-05 DNN IP Protection MethodModel DesignDeep Learning Method 2022.10.05 2025.05.28 Literature Database
Split Federated Learning on Micro-controllers: A Keyword Spotting Showcase Authors: Jingtao Li, Runcong Kuang | Published: 2022-10-04 FrameworkModel DesignDeep Learning Method 2022.10.04 2025.05.28 Literature Database