Computational Efficiency

SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud

Authors: Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi | Published: 2020-09-29 | Updated: 2020-10-05
FPGA Security
Malicious Client
Computational Efficiency

When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control

Authors: Chaochao Chen, Jun Zhou, Li Wang, Xibin Wu, Wenjing Fang, Jin Tan, Lei Wang, Alex X. Liu, Hao Wang, Cheng Hong | Published: 2020-08-20 | Updated: 2021-05-31
Secure Logistic Regression
Computational Efficiency
Communication Efficiency

Revisiting Adversarially Learned Injection Attacks Against Recommender Systems

Authors: Jiaxi Tang, Hongyi Wen, Ke Wang | Published: 2020-08-11 | Updated: 2020-08-28
Adversarial Attack Methods
Optimization Problem
Computational Efficiency

Towards Plausible Differentially Private ADMM Based Distributed Machine Learning

Authors: Jiahao Ding, Jingyi Wang, Guannan Liang, Jinbo Bi, Miao Pan | Published: 2020-08-11
Privacy Protection Method
Optimization Problem
Computational Efficiency

Local Differential Privacy and Its Applications: A Comprehensive Survey

Authors: Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam | Published: 2020-08-09
Data Extraction and Analysis
Privacy Management
Computational Efficiency

TEAM: We Need More Powerful Adversarial Examples for DNNs

Authors: Yaguan Qian, Ximin Zhang, Bin Wang, Wei Li, Zhaoquan Gu, Haijiang Wang, Wassim Swaileh | Published: 2020-07-31 | Updated: 2020-08-10
Attack Method
Adversarial Example
Computational Efficiency

DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs

Authors: Nandan Kumar Jha, Sparsh Mittal, Binod Kumar, Govardhan Mattela | Published: 2020-07-30
Performance Evaluation
Deep Learning
Computational Efficiency

Efficient Sparse Secure Aggregation for Federated Learning

Authors: Constance Beguier, Mathieu Andreux, Eric W. Tramel | Published: 2020-07-29 | Updated: 2021-10-18
Security Analysis
Privacy Assessment
Computational Efficiency

Reachable Sets of Classifiers and Regression Models: (Non-)Robustness Analysis and Robust Training

Authors: Anna-Kathrin Kopetzki, Stephan Günnemann | Published: 2020-07-28 | Updated: 2021-05-12
Performance Evaluation
Adversarial Example
Computational Efficiency

EagerNet: Early Predictions of Neural Networks for Computationally Efficient Intrusion Detection

Authors: Fares Meghdouri, Maximilian Bachl, Tanja Zseby | Published: 2020-07-27 | Updated: 2020-10-15
Intrusion Detection System
Performance Evaluation
Computational Efficiency