Blind Faith: Privacy-Preserving Machine Learning using Function Approximation Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29 Privacy LeakageModel DesignMachine Learning Algorithm 2021.07.29 2025.05.28 Literature Database
Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity Authors: Frank W. Bentrem, Michael A. Corsello, Joshua J. Palm | Published: 2021-04-23 | Updated: 2021-04-27 Automation of CybersecurityModel DesignMachine Learning Technology 2021.04.23 2025.05.28 Literature Database
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU Authors: Sijun Tan, Brian Knott, Yuan Tian, David J. Wu | Published: 2021-04-22 Privacy ProtectionModel DesignEncryption Technology 2021.04.22 2025.05.28 Literature Database
Patch Shortcuts: Interpretable Proxy Models Efficiently Find Black-Box Vulnerabilities Authors: Julia Rosenzweig, Joachim Sicking, Sebastian Houben, Michael Mock, Maram Akila | Published: 2021-04-22 Multi-Class ClassificationModel DesignFeature Engineering 2021.04.22 2025.05.28 Literature Database
Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks Authors: Simon Mandlik, Tomas Pevny | Published: 2021-04-19 | Updated: 2022-06-08 PoisoningModel DesignMachine Learning Technology 2021.04.19 2025.05.28 Literature Database
Vectorized Secure Evaluation of Decision Forests Authors: Raghav Malik, Vidush Singhal, Benjamin Gottfried, Milind Kulkarni | Published: 2021-04-19 Privacy ProtectionModel DesignEncryption Technology 2021.04.19 2025.05.28 Literature Database
Orthogonalizing Convolutional Layers with the Cayley Transform Authors: Asher Trockman, J. Zico Kolter | Published: 2021-04-14 Model DesignResource optimizationMachine Learning Technology 2021.04.14 2025.05.28 Literature Database
Plinius: Secure and Persistent Machine Learning Model Training Authors: Peterson Yuhala, Pascal Felber, Valerio Schiavoni, Alain Tchana | Published: 2021-04-07 | Updated: 2021-04-08 Privacy ProtectionMemory Management MethodModel Design 2021.04.07 2025.05.28 Literature Database
Model Weight Theft With Just Noise Inputs: The Curious Case of the Petulant Attacker Authors: Nicholas Roberts, Vinay Uday Prabhu, Matthew McAteer | Published: 2019-12-19 Data GenerationModel DesignModel Communication 2019.12.19 2025.05.28 Literature Database
Adversarial Model Extraction on Graph Neural Networks Authors: David DeFazio, Arti Ramesh | Published: 2019-12-16 Graph Neural NetworkModel DesignFundamentals of Machine Learning 2019.12.16 2025.05.28 Literature Database