SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud Authors: Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi | Published: 2020-09-29 | Updated: 2020-10-05 FPGA SecurityMalicious ClientComputational Efficiency 2020.09.29 2025.05.28 Literature Database
When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control Authors: Chaochao Chen, Jun Zhou, Li Wang, Xibin Wu, Wenjing Fang, Jin Tan, Lei Wang, Alex X. Liu, Hao Wang, Cheng Hong | Published: 2020-08-20 | Updated: 2021-05-31 Secure Logistic RegressionComputational EfficiencyCommunication Efficiency 2020.08.20 2025.05.28 Literature Database
Revisiting Adversarially Learned Injection Attacks Against Recommender Systems Authors: Jiaxi Tang, Hongyi Wen, Ke Wang | Published: 2020-08-11 | Updated: 2020-08-28 Adversarial Attack MethodsOptimization ProblemComputational Efficiency 2020.08.11 2025.05.28 Literature Database
Towards Plausible Differentially Private ADMM Based Distributed Machine Learning Authors: Jiahao Ding, Jingyi Wang, Guannan Liang, Jinbo Bi, Miao Pan | Published: 2020-08-11 Privacy Protection MethodOptimization ProblemComputational Efficiency 2020.08.11 2025.05.28 Literature Database
Local Differential Privacy and Its Applications: A Comprehensive Survey Authors: Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam | Published: 2020-08-09 Data Extraction and AnalysisPrivacy ManagementComputational Efficiency 2020.08.09 2025.05.28 Literature Database
TEAM: We Need More Powerful Adversarial Examples for DNNs Authors: Yaguan Qian, Ximin Zhang, Bin Wang, Wei Li, Zhaoquan Gu, Haijiang Wang, Wassim Swaileh | Published: 2020-07-31 | Updated: 2020-08-10 Attack MethodAdversarial ExampleComputational Efficiency 2020.07.31 2025.05.28 Literature Database
DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs Authors: Nandan Kumar Jha, Sparsh Mittal, Binod Kumar, Govardhan Mattela | Published: 2020-07-30 Performance EvaluationDeep LearningComputational Efficiency 2020.07.30 2025.05.28 Literature Database
Efficient Sparse Secure Aggregation for Federated Learning Authors: Constance Beguier, Mathieu Andreux, Eric W. Tramel | Published: 2020-07-29 | Updated: 2021-10-18 Security AnalysisPrivacy AssessmentComputational Efficiency 2020.07.29 2025.05.28 Literature Database
Reachable Sets of Classifiers and Regression Models: (Non-)Robustness Analysis and Robust Training Authors: Anna-Kathrin Kopetzki, Stephan Günnemann | Published: 2020-07-28 | Updated: 2021-05-12 Performance EvaluationAdversarial ExampleComputational Efficiency 2020.07.28 2025.05.28 Literature Database
EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby | Published: 2020-07-27 | Updated: 2020-10-15 Intrusion Detection SystemPerformance EvaluationComputational Efficiency 2020.07.27 2025.05.28 Literature Database