Future Research

Effect of Homomorphic Encryption on the Performance of Training Federated Learning Generative Adversarial Networks

Authors: Ignjat Pejic, Rui Wang, Kaitai Liang | Published: 2022-07-01
Future Research
Encryption Method
Challenges of Generative Models

EBM Life Cycle: MCMC Strategies for Synthesis, Defense, and Density Modeling

Authors: Mitch Hill, Jonathan Mitchell, Chu Chen, Yuan Du, Mubarak Shah, Song-Chun Zhu | Published: 2022-05-24
Training Data Generation
Future Research
Adversarial Example

Secure Aggregation for Federated Learning in Flower

Authors: Kwing Hei Li, Pedro Porto Buarque de Gusmão, Daniel J. Beutel, Nicholas D. Lane | Published: 2022-05-12
Training Protocol
Future Research
Communication Efficiency

Automating Internet of Things Network Traffic Collection with Robotic Arm Interactions

Authors: Xi Jiang, Noah Apthorpe | Published: 2021-09-30 | Updated: 2022-10-12
Data Generation
Future Research
Machine Learning Application

Towards Resilient Artificial Intelligence: Survey and Research Issues

Authors: Oliver Eigner, Sebastian Eresheim, Peter Kieseberg, Lukas Daniel Klausner, Martin Pirker, Torsten Priebe, Simon Tjoa, Fiammetta Marulli, Francesco Mercaldo | Published: 2021-09-18
Robustness
Future Research
Adversarial attack

Graph Information Bottleneck

Authors: Tailin Wu, Hongyu Ren, Pan Li, Jure Leskovec | Published: 2020-10-24
Future Research
Information-Theoretic Evaluation
Machine Learning Algorithm

Rethinking Clustering for Robustness

Authors: Motasem Alfarra, Juan C. Pérez, Adel Bibi, Ali Thabet, Pablo Arbeláez, Bernard Ghanem | Published: 2020-06-13 | Updated: 2021-11-19
Improvement of Learning
Future Research
Fundamentals of Machine Learning

Evaluations and Methods for Explanation through Robustness Analysis

Authors: Cheng-Yu Hsieh, Chih-Kuan Yeh, Xuanqing Liu, Pradeep Ravikumar, Seungyeon Kim, Sanjiv Kumar, Cho-Jui Hsieh | Published: 2020-05-31 | Updated: 2021-04-08
Future Research
Feature Importance Analysis
Interpretation Method

A machine-learning approach to Detect users’ suspicious behaviour through the Facebook wall

Authors: Aimilia Panagiotou, Bogdan Ghita, Stavros Shiaeles, Keltoum Bendiab | Published: 2019-10-31
Open Source Disclosure
Privacy Issues
Future Research

Detecting Covert Cryptomining using HPC

Authors: Ankit Gangwal, Samuele Giuliano Piazzetta, Gianluca Lain, Mauro Conti | Published: 2019-08-31 | Updated: 2020-12-15
Future Research
Machine Learning Algorithm
Feature Selection Method