Multi-Player Bandits Robust to Adversarial Collisions Authors: Shivakumar Mahesh, Anshuka Rangi, Haifeng Xu, Long Tran-Thanh | Published: 2022-11-15 Algorithm DesignAttack MethodOptimization Methods 2022.11.15 2025.05.28 Literature Database
Sketching for First Order Method: Efficient Algorithm for Low-Bandwidth Channel and Vulnerability Authors: Zhao Song, Yitan Wang, Zheng Yu, Lichen Zhang | Published: 2022-10-15 | Updated: 2023-06-06 Algorithm DesignPrivacy Risk ManagementConvergence Guarantee 2022.10.15 2025.05.28 Literature Database
Distributed Non-Convex Optimization with One-Bit Compressors on Heterogeneous Data: Efficient and Resilient Algorithms Authors: Ming Xiang, Lili Su | Published: 2022-10-03 | Updated: 2023-02-17 AlgorithmAlgorithm DesignConvergence Guarantee 2022.10.03 2025.05.28 Literature Database
FedNet2Net: Saving Communication and Computations in Federated Learning with Model Growing Authors: Amit Kumar Kundu, Joseph Jaja | Published: 2022-07-19 Algorithm DesignParameter TuningModel Design and Accuracy 2022.07.19 2025.05.28 Literature Database
A Certifiable Security Patch for Object Tracking in Self-Driving Systems via Historical Deviation Modeling Authors: Xudong Pan, Qifan Xiao, Mi Zhang, Min Yang | Published: 2022-07-18 Algorithm DesignSecurity AssuranceState Estimation Method 2022.07.18 2025.05.28 Literature Database
DeTrust-FL: Privacy-Preserving Federated Learning in Decentralized Trust Setting Authors: Runhua Xu, Nathalie Baracaldo, Yi Zhou, Ali Anwar, Swanand Kadhe, Heiko Ludwig | Published: 2022-07-15 Algorithm DesignPrivacy Protection MethodTrust Evaluation Module 2022.07.15 2025.05.28 Literature Database
Mobile Keystroke Biometrics Using Transformers Authors: Giuseppe Stragapede, Paula Delgado-Santos, Ruben Tolosana, Ruben Vera-Rodriguez, Richard Guest, Aythami Morales | Published: 2022-07-15 | Updated: 2022-10-04 Algorithm DesignSystem ObservabilitySimulation Result Evaluation 2022.07.15 2025.05.28 Literature Database
Smooth Anonymity for Sparse Graphs Authors: Alessandro Epasto, Hossein Esfandiari, Vahab Mirrokni, Andres Munoz Medina | Published: 2022-07-13 | Updated: 2024-05-14 Algorithm DesignDataset evaluationPrivacy Protection Method 2022.07.13 2025.05.28 Literature Database
A Personalised User Authentication System based on EEG Signals Authors: Christos Stergiadis, Vasiliki-Despoina Kostaridou, Simeon Veloudis, Dimitrios Kazis, Manousos Klados | Published: 2022-07-13 | Updated: 2022-07-14 Algorithm DesignData Selection StrategyModel Performance Evaluation 2022.07.13 2025.05.28 Literature Database
Game of Trojans: A Submodular Byzantine Approach Authors: Dinuka Sahabandu, Arezoo Rajabi, Luyao Niu, Bo Li, Bhaskar Ramasubramanian, Radha Poovendran | Published: 2022-07-13 Algorithm DesignModel Performance EvaluationStrategic Game 2022.07.13 2025.05.28 Literature Database