“You Can’t Fix What You Can’t Measure”: Privately Measuring Demographic Performance Disparities in Federated Learning Authors: Marc Juarez, Aleksandra Korolova | Published: 2022-06-24 | Updated: 2023-01-11 Algorithm DesignPerformance EvaluationPrivacy Protection Mechanism 2022.06.24 2025.05.28 Literature Database
Authentication of Copy Detection Patterns under Machine Learning Attacks: A Supervised Approach Authors: Brian Pulfer, Roman Chaban, Yury Belousov, Joakim Tutt, Olga Taran, Taras Holotyak, Slava Voloshynovskiy | Published: 2022-06-23 | Updated: 2022-06-25 Algorithm DesignDeep Learning TechnologySelf-Supervised Learning 2022.06.23 2025.05.28 Literature Database
A Framework for Understanding Model Extraction Attack and Defense Authors: Xun Xian, Mingyi Hong, Jie Ding | Published: 2022-06-23 Algorithm DesignMembership InferenceAdversarial Learning 2022.06.23 2025.05.28 Literature Database
Multi-party Secure Broad Learning System for Privacy Preserving Authors: Xiao-Kai Cao, Chang-Dong Wang, Jian-Huang Lai, Qiong Huang, C. L. Philip Chen | Published: 2022-06-22 Algorithm DesignSecure Communication ChannelFeature Extraction Method 2022.06.22 2025.05.28 Literature Database
A Practical Methodology for ML-Based EM Side Channel Disassemblers Authors: Cesar N. Arguello, Hunter Searle, Sara Rampazzi, Kevin R. B. Butler | Published: 2022-06-21 | Updated: 2022-07-20 Algorithm DesignFeature Extraction MethodEvaluation Method 2022.06.21 2025.05.28 Literature Database
sqSGD: Locally Private and Communication Efficient Federated Learning Authors: Yan Feng, Tao Xiong, Ruofan Wu, LingJuan Lv, Leilei Shi | Published: 2022-06-21 | Updated: 2022-06-22 LDP MechanismAlgorithm DesignEfficiency of Distributed Learning 2022.06.21 2025.05.28 Literature Database
Adversarial Robustness is at Odds with Lazy Training Authors: Yunjuan Wang, Enayat Ullah, Poorya Mianjy, Raman Arora | Published: 2022-06-18 | Updated: 2022-10-17 Algorithm DesignAdversarial ExampleAdversarial Attack Detection 2022.06.18 2025.05.28 Literature Database
Automatic Hardware Trojan Insertion using Machine Learning Authors: Jonathan Cruz, Pravin Gaikwad, Abhishek Nair, Prabuddha Chakraborty, Swarup Bhunia | Published: 2022-04-18 Algorithm DesignTrojan DetectionMachine Learning Method 2022.04.18 2025.05.28 Literature Database
Finding MNEMON: Reviving Memories of Node Embeddings Authors: Yun Shen, Yufei Han, Zhikun Zhang, Min Chen, Ting Yu, Michael Backes, Yang Zhang, Gianluca Stringhini | Published: 2022-04-14 | Updated: 2022-04-29 Algorithm DesignDataset evaluationevaluation metrics 2022.04.14 2025.05.28 Literature Database
LSTM-Autoencoder based Anomaly Detection for Indoor Air Quality Time Series Data Authors: Yuanyuan Wei, Julian Jang-Jaccard, Wen Xu, Fariza Sabrina, Seyit Camtepe, Mikael Boulic | Published: 2022-04-14 Algorithm DesignData Extraction and AnalysisMachine Learning Application 2022.04.14 2025.05.28 Literature Database