A Tale of HodgeRank and Spectral Method: Target Attack Against Rank Aggregation Is the Fixed Point of Adversarial Game Authors: Ke Ma, Qianqian Xu, Jinshan Zeng, Guorong Li, Xiaochun Cao, Qingming Huang | Published: 2022-09-13 Model DesignAdversarial Attack DetectionOptimization Strategy 2022.09.13 2025.05.28 Literature Database
Intrusion Detection Systems Using Support Vector Machines on the KDDCUP’99 and NSL-KDD Datasets: A Comprehensive Survey Authors: Mikel K. Ngueajio, Gloria Washington, Danda B. Rawat, Yolande Ngueabou | Published: 2022-09-12 Model DesignIntrusion Detection SystemMachine Learning Method 2022.09.12 2025.05.28 Literature Database
Cocktail Party Attack: Breaking Aggregation-Based Privacy in Federated Learning using Independent Component Analysis Authors: Sanjay Kariyappa, Chuan Guo, Kiwan Maeng, Wenjie Xiong, G. Edward Suh, Moinuddin K Qureshi, Hsien-Hsin S. Lee | Published: 2022-09-12 DNN IP Protection MethodPrivacy AnalysisModel Design 2022.09.12 2025.05.28 Literature Database
Defend Data Poisoning Attacks on Voice Authentication Authors: Ke Li, Cameron Baird, Dan Lin | Published: 2022-09-09 | Updated: 2023-07-07 Model DesignAdversarial Attack DetectionDefense Mechanism 2022.09.09 2025.05.28 Literature Database
Private Read Update Write (PRUW) in Federated Submodel Learning (FSL): Communication Efficient Schemes With and Without Sparsification Authors: Sajani Vithana, Sennur Ulukus | Published: 2022-09-09 Privacy AnalysisModel DesignCommunication Model 2022.09.09 2025.05.28 Literature Database
On Specification-based Cyber-Attack Detection in Smart Grids Authors: Ömer Sen Dennis van der Velde, Maik Lühman, Florian Sprünken, Immanuel Hacker, Andreas Ulbig, Michael Andres, Martin Henze | Published: 2022-09-09 Energy ManagementModel DesignIntrusion Detection System 2022.09.09 2025.05.28 Literature Database
Bridging the Gap: Differentially Private Equivariant Deep Learning for Medical Image Analysis Authors: Florian A. Hölzl, Daniel Rueckert, Georgios Kaissis | Published: 2022-09-09 | Updated: 2023-06-20 DNN IP Protection MethodModel DesignMedical Monitoring System 2022.09.09 2025.05.28 Literature Database
Differentially Private Stochastic Gradient Descent with Low-Noise Authors: Puyu Wang, Yunwen Lei, Yiming Ying, Ding-Xuan Zhou | Published: 2022-09-09 | Updated: 2023-07-14 Privacy AnalysisModel DesignConvergence Guarantee 2022.09.09 2025.05.28 Literature Database
A Framework for Evaluating Privacy-Utility Trade-off in Vertical Federated Learning Authors: Yan Kang, Jiahuan Luo, Yuanqin He, Xiaojin Zhang, Lixin Fan, Qiang Yang | Published: 2022-09-08 | Updated: 2024-08-04 DNN IP Protection MethodPrivacy AnalysisModel Design 2022.09.08 2025.05.28 Literature Database
VulCurator: A Vulnerability-Fixing Commit Detector Authors: Truong Giang Nguyen, Thanh Le-Cong, Hong Jin Kang, Xuan-Bach D. Le, David Lo | Published: 2022-09-07 Model Design and AccuracyModel DesignVulnerability detection 2022.09.07 2025.05.28 Literature Database