User authentication system based on human exhaled breath physics Authors: Mukesh Karunanethy, Rahul Tripathi, Mahesh V Panchagnula, Raghunathan Rengaswamy | Published: 2024-01-02 User Authentication SystemTime-Related FeaturesMachine Learning Method 2024.01.02 2025.05.27 Literature Database
Darknet Traffic Analysis A Systematic Literature Review Authors: Javeriah Saleem, Rafiqul Islam, Zahidul Islam | Published: 2023-11-27 Darknet Traffic AnalysisMachine Learning MethodCommunication Analysis 2023.11.27 2025.05.28 Literature Database
Privacy-Preserving Algorithmic Recourse Authors: Sikha Pentyala, Shubham Sharma, Sanjay Kariyappa, Freddy Lecue, Daniele Magazzeni | Published: 2023-11-23 Privacy ProtectionMachine Learning MethodExplainability 2023.11.23 2025.05.28 Literature Database
A Blockchain Solution for Collaborative Machine Learning over IoT Authors: Carlos Beis-Penedo, Francisco Troncoso-Pastoriza, Rebeca P. Díaz-Redondo, Ana Fernández-Vilas, Manuel Fernández-Veiga, Martín González Soto | Published: 2023-11-23 Security AnalysisPrivacy ProtectionMachine Learning Method 2023.11.23 2025.05.28 Literature Database
DefensiveDR: Defending against Adversarial Patches using Dimensionality Reduction Authors: Nandish Chattopadhyay, Amira Guesmi, Muhammad Abdullah Hanif, Bassem Ouni, Muhammad Shafique | Published: 2023-11-20 Adversarial attackMachine Learning MethodDimensionality Reduction Method 2023.11.20 2025.05.28 Literature Database
HAL 9000: Skynet’s Risk Manager Authors: Tadeu Freitas, Mário Neto, Inês Dutra, João Soares, Manuel Correia, Rolando Martins | Published: 2023-11-15 Software SecurityMachine Learning MethodVulnerability Management 2023.11.15 2025.05.28 Literature Database
Are Normalizing Flows the Key to Unlocking the Exponential Mechanism? Authors: Robert A. Bridges, Vandy J. Tombs, Christopher B. Stanley | Published: 2023-11-15 | Updated: 2024-06-11 Privacy ProtectionConvergence PropertyMachine Learning Method 2023.11.15 2025.05.28 Literature Database
B^2SFL: A Bi-level Blockchained Architecture for Secure Federated Learning-based Traffic Prediction Authors: Hao Guo, Collin Meese, Wanxin Li, Chien-Chung Shen, Mark Nejad | Published: 2023-10-23 Privacy TechniqueModel DesignMachine Learning Method 2023.10.23 2025.05.28 Literature Database
Fundamental Limits of Membership Inference Attacks on Machine Learning Models Authors: Eric Aubinais, Elisabeth Gassiat, Pablo Piantanida | Published: 2023-10-20 | Updated: 2025-05-12 Membership InferenceAdversarial attackMachine Learning Method 2023.10.20 2025.05.28 Literature Database
On existence, uniqueness and scalability of adversarial robustness measures for AI classifiers Authors: Illia Horenko | Published: 2023-10-19 | Updated: 2023-11-15 Adversarial attackOptimization MethodsMachine Learning Method 2023.10.19 2025.05.28 Literature Database