Regularization Can Help Mitigate Poisoning Attacks… with the Right Hyperparameters Authors: Javier Carnerero-Cano, Luis Muñoz-González, Phillippa Spencer, Emil C. Lupu | Published: 2021-05-23 PoisoningOptimization MethodsVulnerability Assessment Method 2021.05.23 2025.05.28 Literature Database
Privacy Amplification Via Bernoulli Sampling Authors: Jacob Imola, Kamalika Chaudhuri | Published: 2021-05-21 | Updated: 2021-10-18 Privacy Protection MethodInformation-Theoretic EvaluationOptimization Methods 2021.05.21 2025.05.28 Literature Database
GALA: Greedy ComputAtion for Linear Algebra in Privacy-Preserved Neural Networks Authors: Qiao Zhang, Chunsheng Xin, Hongyi Wu | Published: 2021-05-05 Data Management SystemPrivacy ProtectionOptimization Methods 2021.05.05 2025.05.28 Literature Database
Statistical inference for individual fairness Authors: Subha Maity, Songkai Xue, Mikhail Yurochkin, Yuekai Sun | Published: 2021-03-30 Risk Assessment MethodFairness evaluationOptimization Methods 2021.03.30 2025.05.28 Literature Database
Enabling Homomorphically Encrypted Inference for Large DNN Models Authors: Guillermo Lloret-Talavera, Marc Jorda, Harald Servat, Fabian Boemer, Chetan Chauhan, Shigeki Tomishima, Nilesh N. Shah, Antonio J. Peña | Published: 2021-03-30 | Updated: 2021-04-29 Measurement of MemorizationEncryption MethodOptimization Methods 2021.03.30 2025.05.28 Literature Database
Graph Unlearning Authors: Min Chen, Zhikun Zhang, Tianhao Wang, Michael Backes, Mathias Humbert, Yang Zhang | Published: 2021-03-27 | Updated: 2022-09-16 Data Management SystemConvergence PropertyOptimization Methods 2021.03.27 2025.05.28 Literature Database
Adversarial Attacks on Deep Learning Based mmWave Beam Prediction in 5G and Beyond Authors: Brian Kim, Yalin E. Sagduyu, Tugba Erpek, Sennur Ulukus | Published: 2021-03-25 Vulnerability of Adversarial ExamplesOptimization MethodsWireless Channel Detection 2021.03.25 2025.05.28 Literature Database
Black-box Detection of Backdoor Attacks with Limited Information and Data Authors: Yinpeng Dong, Xiao Yang, Zhijie Deng, Tianyu Pang, Zihao Xiao, Hang Su, Jun Zhu | Published: 2021-03-24 Backdoor AttackOptimization MethodsDefense Mechanism 2021.03.24 2025.05.28 Literature Database
A Challenge Obfuscating Interface for Arbiter PUF Variants against Machine Learning Attacks Authors: Yu Zhuang, Khalid T. Mursi, Li Gaoxiang | Published: 2021-03-24 Optimization MethodsVulnerability Assessment MethodDefense Mechanism 2021.03.24 2025.05.28 Literature Database
CNN vs ELM for Image-Based Malware Classification Authors: Mugdha Jain, William Andreopoulos, Mark Stamp | Published: 2021-03-24 PE Malware ClassificationOptimization MethodsImage Feature Extraction 2021.03.24 2025.05.28 Literature Database