Computational Efficiency

ChatNVD: Advancing Cybersecurity Vulnerability Assessment with Large Language Models

Authors: Shivansh Chopra, Hussain Ahmad, Diksha Goel, Claudia Szabo | Published: 2024-12-06 | Updated: 2025-05-20
Text Generation Method
Prompt Injection
Computational Efficiency

Verification of Machine Unlearning is Fragile

Authors: Binchi Zhang, Zihan Chen, Cong Shen, Jundong Li | Published: 2024-08-01
Algorithm
Model Performance Evaluation
Computational Efficiency

A Hybrid Federated Kernel Regularized Least Squares Algorithm

Authors: Celeste Damiani, Yulia Rodina, Sergio Decherchi | Published: 2024-07-24
Algorithm
Watermarking
Computational Efficiency

Attack-Aware Noise Calibration for Differential Privacy

Authors: Bogdan Kulynych, Juan Felipe Gomez, Georgios Kaissis, Flavio du Pin Calmon, Carmela Troncoso | Published: 2024-07-02 | Updated: 2024-11-07
Privacy Protection
Privacy Protection Method
Computational Efficiency

Speed-up of Data Analysis with Kernel Trick in Encrypted Domain

Authors: Joon Soo Yoo, Baek Kyung Song, Tae Min Ahn, Ji Won Heo, Ji Won Yoon | Published: 2024-06-14
Watermarking
Computational Efficiency
Computational Complexity

VeriSplit: Secure and Practical Offloading of Machine Learning Inferences across IoT Devices

Authors: Han Zhang, Zifan Wang, Mihir Dhamankar, Matt Fredrikson, Yuvraj Agarwal | Published: 2024-06-02 | Updated: 2025-03-31
Watermarking
Data Privacy Assessment
Computational Efficiency

A Simple Solution for Homomorphic Evaluation on Large Intervals

Authors: John Chiang | Published: 2024-05-24
Algorithm
Watermarking
Computational Efficiency

PackVFL: Efficient HE Packing for Vertical Federated Learning

Authors: Liu Yang, Shuowei Cai, Di Chai, Junxue Zhang, Han Tian, Yilun Jin, Kun Guo, Kai Chen, Qiang Yang | Published: 2024-05-01
Characteristics of VFL
Matrix Multiplication Methods
Computational Efficiency

zkLLM: Zero Knowledge Proofs for Large Language Models

Authors: Haochen Sun, Jason Li, Hongyang Zhang | Published: 2024-04-24
Prompt Injection
Computational Efficiency
Watermark Robustness

Reconfigurable Edge Hardware for Intelligent IDS: Systematic Approach

Authors: Wadid Foudhaili, Anouar Nechi, Celine Thermann, Mohammad Al Johmani, Rainer Buchty, Mladen Berekovic, Saleh Mulhem | Published: 2024-04-13
FPGA
Resource optimization
Computational Efficiency