Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks Authors: Ignjat Pejic, Rui Wang, Kaitai Liang | Published: 2022-07-01 Future ResearchEncryption MethodChallenges of Generative Models 2022.07.01 2025.05.28 Literature Database
EBM Life Cycle: MCMC Strategies for Synthesis, Defense, and Density Modeling Authors: Mitch Hill, Jonathan Mitchell, Chu Chen, Yuan Du, Mubarak Shah, Song-Chun Zhu | Published: 2022-05-24 Training Data GenerationFuture ResearchAdversarial Example 2022.05.24 2025.05.28 Literature Database
Secure Aggregation for Federated Learning in Flower Authors: Kwing Hei Li, Pedro Porto Buarque de Gusmão, Daniel J. Beutel, Nicholas D. Lane | Published: 2022-05-12 Training ProtocolFuture ResearchCommunication Efficiency 2022.05.12 2025.05.28 Literature Database
Automating Internet of Things Network Traffic Collection with Robotic Arm Interactions Authors: Xi Jiang, Noah Apthorpe | Published: 2021-09-30 | Updated: 2022-10-12 Data GenerationFuture ResearchMachine Learning Application 2021.09.30 2025.05.28 Literature Database
Towards Resilient Artificial Intelligence: Survey and Research Issues Authors: Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo | Published: 2021-09-18 RobustnessFuture ResearchAdversarial attack 2021.09.18 2025.05.28 Literature Database
Graph Information Bottleneck Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24 Future ResearchInformation-Theoretic EvaluationMachine Learning Algorithm 2020.10.24 2025.05.28 Literature Database
Rethinking Clustering for Robustness Authors: Motasem Alfarra, Juan C. Pérez, Adel Bibi, Ali Thabet, Pablo Arbeláez, Bernard Ghanem | Published: 2020-06-13 | Updated: 2021-11-19 Improvement of LearningFuture ResearchFundamentals of Machine Learning 2020.06.13 2025.05.28 Literature Database
Evaluations and Methods for Explanation through Robustness Analysis Authors: Cheng-Yu Hsieh, Chih-Kuan Yeh, Xuanqing Liu, Pradeep Ravikumar, Seungyeon Kim, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2020-05-31 | Updated: 2021-04-08 Future ResearchFeature Importance AnalysisInterpretation Method 2020.05.31 2025.05.28 Literature Database
A machine-learning approach to Detect users’ suspicious behaviour through the Facebook wall Authors: Aimilia Panagiotou, Bogdan Ghita, Stavros Shiaeles, Keltoum Bendiab | Published: 2019-10-31 Open Source DisclosurePrivacy IssuesFuture Research 2019.10.31 2025.05.28 Literature Database
Detecting Covert Cryptomining using HPC Authors: Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti | Published: 2019-08-31 | Updated: 2020-12-15 Future ResearchMachine Learning AlgorithmFeature Selection Method 2019.08.31 2025.05.28 Literature Database