Modified Genetic Algorithm for Feature Selection and Hyper Parameter Optimization: Case of XGBoost in Spam Prediction Authors: Nazeeh Ghatasheh, Ismail Altaharwa, Khaled Aldebei | Published: 2023-10-30 Spam DetectionSelection and Evaluation of Optimization AlgorithmsComputational Efficiency 2023.10.30 2025.05.28 Literature Database
Robust and Actively Secure Serverless Collaborative Learning Authors: Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2023-10-25 Security AnalysisByzantine ResilienceComputational Efficiency 2023.10.25 2025.05.28 Literature Database
Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation Authors: Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal | Published: 2023-08-30 | Updated: 2023-11-26 Data GenerationPrivacy Protection MethodComputational Efficiency 2023.08.30 2025.05.28 Literature Database
Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04 Feature Extraction MethodFeature Selection MethodComputational Efficiency 2023.07.04 2025.05.28 Literature Database
Universal adversarial perturbations for multiple classification tasks with quantum classifiers Authors: Yun-Zhong Qiu | Published: 2023-06-21 | Updated: 2023-10-25 Optimization MethodsComputational EfficiencyQuantum Cryptography Technology 2023.06.21 2025.05.28 Literature Database
Cyber Key Terrain Identification Using Adjusted PageRank Centrality Authors: Lukáš Sadlek, Pavel Čeleda | Published: 2023-06-19 | Updated: 2024-04-24 AlgorithmTime Window AnalysisComputational Efficiency 2023.06.19 2025.05.28 Literature Database
Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15 Data CollectionThreat modelingComputational Efficiency 2023.06.15 2025.05.28 Literature Database
PLAN: Variance-Aware Private Mean Estimation Authors: Martin Aumüller, Christian Janos Lebeda, Boel Nelson, Rasmus Pagh | Published: 2023-06-14 | Updated: 2024-04-10 AlgorithmPrivacy TechniqueComputational Efficiency 2023.06.14 2025.05.28 Literature Database
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions Authors: Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum | Published: 2023-06-14 | Updated: 2024-04-16 AlgorithmMembership InferenceComputational Efficiency 2023.06.14 2025.05.28 Literature Database
Privacy-Aware Compression for Federated Learning Through Numerical Mechanism Design Authors: Chuan Guo, Kamalika Chaudhuri, Pierre Stock, Mike Rabbat | Published: 2022-11-08 | Updated: 2023-08-10 Privacy Protection MethodOptimization MethodsComputational Efficiency 2022.11.08 2025.05.28 Literature Database