Algorithm Design

Multi-Player Bandits Robust to Adversarial Collisions

Authors: Shivakumar Mahesh, Anshuka Rangi, Haifeng Xu, Long Tran-Thanh | Published: 2022-11-15
Algorithm Design
Attack Method
Optimization Methods

Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability

Authors: Zhao Song, Yitan Wang, Zheng Yu, Lichen Zhang | Published: 2022-10-15 | Updated: 2023-06-06
Algorithm Design
Privacy Risk Management
Convergence Guarantee

Distributed Non-Convex Optimization with One-Bit Compressors on Heterogeneous Data: Efficient and Resilient Algorithms

Authors: Ming Xiang, Lili Su | Published: 2022-10-03 | Updated: 2023-02-17
Algorithm
Algorithm Design
Convergence Guarantee

FedNet2Net: Saving Communication and Computations in Federated Learning with Model Growing

Authors: Amit Kumar Kundu, Joseph Jaja | Published: 2022-07-19
Algorithm Design
Parameter Tuning
Model Design and Accuracy

A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling

Authors: Xudong Pan, Qifan Xiao, Mi Zhang, Min Yang | Published: 2022-07-18
Algorithm Design
Security Assurance
State Estimation Method

DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting

Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig | Published: 2022-07-15
Algorithm Design
Privacy Protection Method
Trust Evaluation Module

Mobile Keystroke Biometrics Using Transformers

Authors: Giuseppe Stragapede, Paula Delgado-Santos, Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Aythami Morales | Published: 2022-07-15 | Updated: 2022-10-04
Algorithm Design
System Observability
Simulation Result Evaluation

Smooth Anonymity for Sparse Graphs

Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14
Algorithm Design
Dataset evaluation
Privacy Protection Method

A Personalised User Authentication System based on EEG Signals

Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14
Algorithm Design
Data Selection Strategy
Model Performance Evaluation

Game of Trojans: A Submodular Byzantine Approach

Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-07-13
Algorithm Design
Model Performance Evaluation
Strategic Game