Scaling Polyhedral Neural Network Verification on GPUs Authors: Christoph Müller, François Serre, Gagandeep Singh, Markus Püschel, Martin Vechev | Published: 2020-07-20 | Updated: 2021-05-18 Performance EvaluationDeep LearningComputational Efficiency 2020.07.20 2025.05.28 Literature Database
Differentially Private Simple Linear Regression Authors: Daniel Alabi, Audra McMillan, Jayshree Sarathy, Adam Smith, Salil Vadhan | Published: 2020-07-10 Hyperparameter TuningPrivacy AssessmentComputational Efficiency 2020.07.10 2025.05.28 Literature Database
Stochastic Linear Bandits Robust to Adversarial Attacks Authors: Ilija Bogunovic, Arpan Losalka, Andreas Krause, Jonathan Scarlett | Published: 2020-07-07 | Updated: 2020-10-27 Quantification of UncertaintyAdversarial LearningComputational Efficiency 2020.07.07 2025.05.28 Literature Database
Robust Learning with Frequency Domain Regularization Authors: Weiyu Guo, Yidong Ouyang | Published: 2020-07-07 Adversarial LearningFundamentals of Machine LearningComputational Efficiency 2020.07.07 2025.05.28 Literature Database
Black-box Adversarial Example Generation with Normalizing Flows Authors: Hadi M. Dolatabadi, Sarah Erfani, Christopher Leckie | Published: 2020-07-06 Adversarial LearningChallenges of Generative ModelsComputational Efficiency 2020.07.06 2025.05.28 Literature Database
BLAZE: Blazing Fast Privacy-Preserving Machine Learning Authors: Arpita Patra, Ajith Suresh | Published: 2020-05-18 MPC AlgorithmMachine Learning AlgorithmComputational Efficiency 2020.05.18 2025.05.28 Literature Database
Large-Scale Secure XGB for Vertical Federated Learning Authors: Wenjing Fang, Derun Zhao, Jin Tan, Chaochao Chen, Chaofan Yu, Li Wang, Lei Wang, Jun Zhou, Benyu Zhang | Published: 2020-05-18 | Updated: 2021-09-02 Machine Learning AlgorithmComputational EfficiencyFederated Learning System 2020.05.18 2025.05.28 Literature Database
Prive-HD: Privacy-Preserved Hyperdimensional Computing Authors: Behnam Khaleghi, Mohsen Imani, Tajana Rosing | Published: 2020-05-14 Privacy LeakageComputational EfficiencyAdaptive Retraining Mechanism 2020.05.14 2025.05.28 Literature Database
Android Malware Clustering using Community Detection on Android Packages Similarity Network Authors: ElMouatez Billah Karbab, Mourad Debbabi, Abdelouahid Derhab, Djedjiga Mouheb | Published: 2020-05-12 Community DetectionMalware Propagation MeansComputational Efficiency 2020.05.12 2025.05.28 Literature Database
DarkneTZ: Towards Model Privacy at the Edge using Trusted Execution Environments Authors: Fan Mo, Ali Shahin Shamsabadi, Kleomenis Katevas, Soteris Demetriou, Ilias Leontiadis, Andrea Cavallaro, Hamed Haddadi | Published: 2020-04-12 TEE ImplementationPrivacy IssuesComputational Efficiency 2020.04.12 2025.05.28 Literature Database