FedFisher: Leveraging Fisher Information for One-Shot Federated Learning Authors: Divyansh Jhunjhunwala, Shiqiang Wang, Gauri Joshi | Published: 2024-03-19 Convergence GuaranteeCommunication EfficiencyFederated Learning 2024.03.19 2025.05.27 Literature Database
Pencil: Private and Extensible Collaborative Learning without the Non-Colluding Assumption Authors: Xuanqi Liu, Zhuotao Liu, Qi Li, Ke Xu, Mingwei Xu | Published: 2024-03-17 Training ProtocolPrivacy Protection MethodFederated Learning 2024.03.17 2025.05.27 Literature Database
Securing Federated Learning with Control-Flow Attestation: A Novel Framework for Enhanced Integrity and Resilience against Adversarial Attacks Authors: Zahir Alsulaimawi | Published: 2024-03-15 Scalability AnalysisSecurity AnalysisFederated Learning 2024.03.15 2025.05.27 Literature Database
Explainable Machine Learning-Based Security and Privacy Protection Framework for Internet of Medical Things Systems Authors: Ayoub Si-ahmed, Mohammed Ali Al-Garadi, Narhimene Boustia | Published: 2024-03-14 IoMT SecurityAnomaly Detection MethodFederated Learning 2024.03.14 2025.05.27 Literature Database
Don’t Forget What I did?: Assessing Client Contributions in Federated Learning Authors: Bishwamittra Ghosh, Debabrota Basu, Fu Huazhu, Wang Yuan, Renuga Kanagavelu, Jiang Jin Peng, Liu Yong, Goh Siow Mong Rick, Wei Qingsong | Published: 2024-03-11 Client Contribution AssessmentOptimization MethodsFederated Learning 2024.03.11 2025.05.27 Literature Database
Provable Mutual Benefits from Federated Learning in Privacy-Sensitive Domains Authors: Nikita Tsoy, Anna Mihalkova, Teodora Todorova, Nikola Konstantinov | Published: 2024-03-11 | Updated: 2024-11-07 PoisoningOptimization ProblemFederated Learning 2024.03.11 2025.05.27 Literature Database
Fluent: Round-efficient Secure Aggregation for Private Federated Learning Authors: Xincheng Li, Jianting Ning, Geong Sen Poh, Leo Yu Zhang, Xinchun Yin, Tianwei Zhang | Published: 2024-03-10 Computational EfficiencyCommunication EfficiencyFederated Learning 2024.03.10 2025.05.27 Literature Database
Do You Trust Your Model? Emerging Malware Threats in the Deep Learning Ecosystem Authors: Dorjan Hitaj, Giulio Pagnotta, Fabio De Gaspari, Sediola Ruko, Briland Hitaj, Luigi V. Mancini, Fernando Perez-Cruz | Published: 2024-03-06 | Updated: 2025-05-13 Prompt InjectionMalware ClassificationFederated Learning 2024.03.06 2025.05.27 Literature Database
Enhancing Security in Federated Learning through Adaptive Consensus-Based Model Update Validation Authors: Zahir Alsulaimawi | Published: 2024-03-05 PoisoningFederated LearningDefense Method 2024.03.05 2025.05.27 Literature Database
Federated Learning Under Attack: Exposing Vulnerabilities through Data Poisoning Attacks in Computer Networks Authors: Ehsan Nowroozi, Imran Haider, Rahim Taheri, Mauro Conti | Published: 2024-03-05 Backdoor AttackPoisoningFederated Learning 2024.03.05 2025.05.27 Literature Database