Stochastic Coded Federated Learning: Theoretical Analysis and Incentive Mechanism Design Authors: Yuchang Sun, Jiawei Shao, Yuyi Mao, Songze Li, Jun Zhang | Published: 2022-11-08 | Updated: 2023-11-18 Privacy Protection MethodImprovement of LearningOptimization Methods 2022.11.08 2025.05.28 Literature Database
Privacy-Aware Compression for Federated Learning Through Numerical Mechanism Design Authors: Chuan Guo, Kamalika Chaudhuri, Pierre Stock, Mike Rabbat | Published: 2022-11-08 | Updated: 2023-08-10 Privacy Protection MethodOptimization MethodsComputational Efficiency 2022.11.08 2025.05.28 Literature Database
Revisiting Hyperparameter Tuning with Differential Privacy Authors: Youlong Ding, Xueyang Wu | Published: 2022-11-03 | Updated: 2023-01-31 Hyperparameter TuningPrivacy Protection MethodOptimization Methods 2022.11.03 2025.05.28 Literature Database
FedMint: Intelligent Bilateral Client Selection in Federated Learning with Newcomer IoT Devices Authors: Osama Wehbi, Sarhad Arisdakessian, Omar Abdel Wahab, Hadi Otrok, Safa Otoum, Azzam Mourad, Mohsen Guizani | Published: 2022-10-31 Client Contribution AssessmentModel Design and AccuracyOptimization Methods 2022.10.31 2025.05.28 Literature Database
Review on Classification Techniques used in Biophysiological Stress Monitoring Authors: Talha Iqbal, Adnan Elahi, Atif Shahzad, William Wijns | Published: 2022-10-28 Stress ManagementModel Design and AccuracyOptimization Methods 2022.10.28 2025.05.28 Literature Database
Isometric 3D Adversarial Examples in the Physical World Authors: Yibo Miao, Yinpeng Dong, Jun Zhu, Xiao-Shan Gao | Published: 2022-10-27 Adversarial TrainingOptimization MethodsGenerative Adversarial Network 2022.10.27 2025.05.28 Literature Database
The Inconvenient Truths of Ground Truth for Binary Analysis Authors: Jim Alves-Foss, Varsah Venugopal | Published: 2022-10-26 Program AnalysisOptimization MethodsFunction Definition 2022.10.26 2025.05.28 Literature Database
A Black-Box Attack on Optical Character Recognition Systems Authors: Samet Bayram, Kenneth Barner | Published: 2022-08-30 Adversarial ExampleAdversarial attackOptimization Methods 2022.08.30 2025.05.28 Literature Database
Node Copying: A Random Graph Model for Effective Graph Sampling Authors: Florence Regol, Soumyasundar Pal, Jianing Sun, Yingxue Zhang, Yanhui Geng, Mark Coates | Published: 2022-08-04 Class Mapping MethodData GenerationOptimization Methods 2022.08.04 2025.05.28 Literature Database
Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility Authors: Behrooz Razeghi, Flavio P. Calmon, Deniz Gunduz, Slava Voloshynovskiy | Published: 2022-07-11 Algorithm DesignInformation-Theoretic PrivacyOptimization Methods 2022.07.11 2025.05.28 Literature Database