A chaotic maps-based privacy-preserving distributed deep learning for incomplete and Non-IID datasets Authors: Irina Arévalo, Jose L. Salmeron | Published: 2024-02-15 Privacy Protection MethodCryptographyFederated Learning 2024.02.15 2025.05.27 Literature Database
Smuche: Scalar-Multiplicative Caching in Homomorphic Encryption Authors: Dongfang Zhao | Published: 2023-12-26 AlgorithmWatermarkingCryptography 2023.12.26 2025.05.27 Literature Database
Leveraging a Randomized Key Matrix to Enhance the Security of Symmetric Substitution Ciphers Authors: Shubham Gandhi, Om Khare, Mihika Dravid, Mihika Sanghvi, Sunil Mane, Aadesh Gajaralwar, Saloni Gandhi | Published: 2023-11-29 WatermarkingCryptographyCryptography 2023.11.29 2025.05.28 Literature Database
Hyperdimensional Computing as a Rescue for Efficient Privacy-Preserving Machine Learning-as-a-Service Authors: Jaewoo Park, Chenghao Quan, Hyungon Moon, Jongeun Lee | Published: 2023-08-17 WatermarkingCryptographyMachine Learning Method 2023.08.17 2025.05.28 Literature Database
Privacy-preserving patient clustering for personalized federated learning Authors: Ahmed Elhussein, Gamze Gursoy | Published: 2023-07-17 Variable Extraction MethodCryptographyFederated Learning 2023.07.17 2025.05.28 Literature Database
Unclonability and Quantum Cryptanalysis: From Foundations to Applications Authors: Mina Doosti | Published: 2022-10-31 WatermarkingCryptographyQuantum Information and Quantum Computing 2022.10.31 2025.05.28 Literature Database
Fuzzing+Hardware Performance Counters-Based Detection of Algorithm Subversion Attacks on Post-Quantum Signature Schemes Authors: Animesh Basak Chowdhury, Anushree Mahapatra, Deepraj Soni, Ramesh Karri | Published: 2022-03-13 Dynamic AnalysisCryptographyFeature Extraction Method 2022.03.13 2025.05.28 Literature Database
CryptoNAS: Private Inference on a ReLU Budget Authors: Zahra Ghodsi, Akshaj Veldanda, Brandon Reagen, Siddharth Garg | Published: 2020-06-15 | Updated: 2021-05-13 CryptographyPrivacy Protection in Machine LearningDeep Learning Method 2020.06.15 2025.05.28 Literature Database
Adversarial Data Encryption Authors: Yingdong Hu, Liang Zhang, Wei Shan, Xiaoxiao Qin, Jing Qi, Zhenzhou Wu, Yang Yuan | Published: 2020-02-10 | Updated: 2020-02-11 PoisoningAdversarial attackCryptography 2020.02.10 2025.05.28 Literature Database
Security and Privacy in IoT Using Machine Learning and Blockchain: Threats & Countermeasures Authors: Nazar Waheed, Xiangjian He, Muhammad Ikram, Muhammad Usman, Saad Sajid Hashmi, Muhammad Usman | Published: 2020-02-10 | Updated: 2020-08-06 IoT-Specific ThreatsPrivacy Protection MechanismCryptography 2020.02.10 2025.05.28 Literature Database