VERTICES: Efficient Two-Party Vertical Federated Linear Model with TTP-aided Secret Sharing Authors: Mingxuan Fan, Yilun Jin, Liu Yang, Zhenghang Ren, Kai Chen | Published: 2023-06-28 MPC AlgorithmComputational ComplexityFederated Learning 2023.06.28 2025.05.28 Literature Database
VertiBayes: Learning Bayesian network parameters from vertically partitioned data with missing values Authors: Florian van Daalen, Lianne Ippel, Andre Dekker, Inigo Bermejo | Published: 2022-10-31 | Updated: 2024-05-21 Privacy Protection MethodStructural LearningComputational Complexity 2022.10.31 2025.05.28 Literature Database
Scalable Whitebox Attacks on Tree-based Models Authors: Giuseppe Castiglione, Gavin Ding, Masoud Hashemi, Christopher Srinivasa, Ga Wu | Published: 2022-03-31 Machine LearningDurability IssueComputational Complexity 2022.03.31 2025.05.28 Literature Database
LSTMSPLIT: Effective SPLIT Learning based LSTM on Sequential Time-Series Data Authors: Lianlian Jiang, Yuexuan Wang, Wenyi Zheng, Chao Jin, Zengxiang Li, Sin G. Teo | Published: 2022-03-08 Privacy Protection MechanismFrameworkComputational Complexity 2022.03.08 2025.05.28 Literature Database
Spoofing Generalization: When Can’t You Trust Proprietary Models? Authors: Ankur Moitra, Elchanan Mossel, Colin Sandon | Published: 2021-06-15 | Updated: 2022-03-23 Security AssuranceSignature Scheme AttackComputational Complexity 2021.06.15 2025.05.28 Literature Database
Query complexity of adversarial attacks Authors: Grzegorz Głuch, Rüdiger Urbanke | Published: 2020-10-02 | Updated: 2021-02-10 Robustness EvaluationDeep Learning MethodComputational Complexity 2020.10.02 2025.05.28 Literature Database
Towards adversarial robustness with 01 loss neural networks Authors: Yunzhe Xue, Meiyan Xie, Usman Roshan | Published: 2020-08-20 Adversarial Spectrum Attack DetectionDeep LearningComputational Complexity 2020.08.20 2025.05.28 Literature Database
On $\ell_p$-norm Robustness of Ensemble Stumps and Trees Authors: Yihan Wang, Huan Zhang, Hongge Chen, Duane Boning, Cho-Jui Hsieh | Published: 2020-08-20 | Updated: 2020-09-29 Robustness Verification MethodReinforcement Learning AlgorithmComputational Complexity 2020.08.20 2025.05.28 Literature Database
Adversarial Immunization for Certifiable Robustness on Graphs Authors: Shuchang Tao, Huawei Shen, Qi Cao, Liang Hou, Xueqi Cheng | Published: 2020-07-19 | Updated: 2021-08-25 Graph TransformationPoisoningComputational Complexity 2020.07.19 2025.05.28 Literature Database
Code-Bridged Classifier (CBC): A Low or Negative Overhead Defense for Making a CNN Classifier Robust Against Adversarial Attacks Authors: Farnaz Behnia, Ali Mirzaeian, Mohammad Sabokrou, Sai Manoj, Tinoosh Mohsenin, Khaled N. Khasawneh, Liang Zhao, Houman Homayoun, Avesta Sasan | Published: 2020-01-16 Adversarial ExampleAdversarial LearningComputational Complexity 2020.01.16 2025.05.28 Literature Database