Cryptography

A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets

Authors: Irina Arévalo, Jose L. Salmeron | Published: 2024-02-15
Privacy Protection Method
Cryptography
Federated Learning

Smuche: Scalar-Multiplicative Caching in Homomorphic Encryption

Authors: Dongfang Zhao | Published: 2023-12-26
Algorithm
Watermarking
Cryptography

Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers

Authors: Shubham Gandhi, Om Khare, Mihika Dravid, Mihika Sanghvi, Sunil Mane, Aadesh Gajaralwar, Saloni Gandhi | Published: 2023-11-29
Watermarking
Cryptography
Cryptography

Hyperdimensional Computing as a Rescue for Efficient Privacy-Preserving Machine Learning-as-a-Service

Authors: Jaewoo Park, Chenghao Quan, Hyungon Moon, Jongeun Lee | Published: 2023-08-17
Watermarking
Cryptography
Machine Learning Method

Privacy-preserving patient clustering for personalized federated learning

Authors: Ahmed Elhussein, Gamze Gursoy | Published: 2023-07-17
Variable Extraction Method
Cryptography
Federated Learning

Unclonability and Quantum Cryptanalysis: From Foundations to Applications

Authors: Mina Doosti | Published: 2022-10-31
Watermarking
Cryptography
Quantum Information and Quantum Computing

Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes

Authors: Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri | Published: 2022-03-13
Dynamic Analysis
Cryptography
Feature Extraction Method

CryptoNAS: Private Inference on a ReLU Budget

Authors: Zahra Ghodsi, Akshaj Veldanda, Brandon Reagen, Siddharth Garg | Published: 2020-06-15 | Updated: 2021-05-13
Cryptography
Privacy Protection in Machine Learning
Deep Learning Method

Adversarial Data Encryption

Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11
Poisoning
Adversarial attack
Cryptography

Security and Privacy in IoT Using Machine Learning and Blockchain: Threats & Countermeasures

Authors: Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman | Published: 2020-02-10 | Updated: 2020-08-06
IoT-Specific Threats
Privacy Protection Mechanism
Cryptography