dpart: Differentially Private Autoregressive Tabular, a General Framework for Synthetic Data Generation Authors: Sofiane Mahiou, Kai Xu, Georgi Ganev | Published: 2022-07-12 Algorithm DesignPrivacy ProtectionPrivacy Enhancing Technology 2022.07.12 2025.05.28 Literature Database
Bottlenecks CLUB: Unifying Information-Theoretic Trade-offs Among Complexity, Leakage, and Utility Authors: Behrooz Razeghi, Flavio P. Calmon, Deniz Gunduz, Slava Voloshynovskiy | Published: 2022-07-11 Algorithm DesignInformation-Theoretic PrivacyOptimization Methods 2022.07.11 2025.05.28 Literature Database
SALSA: Attacking Lattice Cryptography with Transformers Authors: Emily Wenger, Mingjie Chen, François Charton, Kristin Lauter | Published: 2022-07-11 | Updated: 2023-04-21 Algorithm DesignModel Design and AccuracyOptimization Methods 2022.07.11 2025.05.28 Literature Database
PUF-Phenotype: A Robust and Noise-Resilient Approach to Aid Intra-Group-based Authentication with DRAM-PUFs Using Machine Learning Authors: Owen Millwood, Jack Miskelly, Bohao Yang, Prosanta Gope, Elif Kavun, Chenghua Lin | Published: 2022-07-11 Algorithm DesignModel Design and AccuracyDefense Method 2022.07.11 2025.05.28 Literature Database
Best Subset Selection with Efficient Primal-Dual Algorithm Authors: Shaogang Ren, Guanhua Fang, Ping Li | Published: 2022-07-05 Algorithm DesignOptimization ProblemFeature Selection Method 2022.07.05 2025.05.28 Literature Database
Defending against the Label-flipping Attack in Federated Learning Authors: Najeeb Moharram Jebreel, Josep Domingo-Ferrer, David Sánchez, Alberto Blanco-Justicia | Published: 2022-07-05 Algorithm DesignPoisoningDefense Method 2022.07.05 2025.05.28 Literature Database
High-Dimensional Private Empirical Risk Minimization by Greedy Coordinate Descent Authors: Paul Mangold, Aurélien Bellet, Joseph Salmon, Marc Tommasi | Published: 2022-07-04 | Updated: 2023-04-09 Algorithm DesignConvergence GuaranteeSelection and Evaluation of Optimization Algorithms 2022.07.04 2025.05.28 Literature Database
FL-Defender: Combating Targeted Attacks in Federated Learning Authors: Najeeb Jebreel, Josep Domingo-Ferrer | Published: 2022-07-02 Attack Methods against DFLAlgorithm DesignPoisoning 2022.07.02 2025.05.28 Literature Database
When Does Differentially Private Learning Not Suffer in High Dimensions? Authors: Xuechen Li, Daogao Liu, Tatsunori Hashimoto, Huseyin A. Inan, Janardhan Kulkarni, Yin Tat Lee, Abhradeep Guha Thakurta | Published: 2022-07-01 | Updated: 2022-10-26 Algorithm DesignSample ComplexityPrivacy Risk Management 2022.07.01 2025.05.28 Literature Database
IBP Regularization for Verified Adversarial Robustness via Branch-and-Bound Authors: Alessandro De Palma, Rudy Bunel, Krishnamurthy Dvijotham, M. Pawan Kumar, Robert Stanforth | Published: 2022-06-29 | Updated: 2023-05-31 Algorithm DesignEfficient Proof SystemAdversarial Learning 2022.06.29 2025.05.28 Literature Database