Algorithm

“Adversarial Examples” for Proof-of-Learning

Authors: Rui Zhang, Jian Liu, Yuan Ding, Zhibo Wu, Qingbiao Wang, Kui Ren | Published: 2021-08-21 | Updated: 2022-04-05
Algorithm
Training Protocol
Adversarial Example

OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

Authors: Pengcheng Jiang, Kenji Tei | Published: 2021-08-16 | Updated: 2021-11-02
Algorithm
Module Reconfiguration
Computational Efficiency

Secure Neuroimaging Analysis using Federated Learning with Homomorphic Encryption

Authors: Dimitris Stripelis, Hamza Saleem, Tanmay Ghai, Nikhil Dhinagar, Umang Gupta, Chrysovalantis Anastasiou, Greg Ver Steeg, Srivatsan Ravi, Muhammad Naveed, Paul M. Thompson, Jose Luis Ambite | Published: 2021-08-07 | Updated: 2021-11-09
Algorithm
Poisoning
Federated Learning

Derivative-free Alternating Projection Algorithms for General Nonconvex-Concave Minimax Problems

Authors: Zi Xu, Ziqi Wang, Jingjing Shen, Yuhong Dai | Published: 2021-08-01 | Updated: 2024-01-25
Algorithm
Hyperparameter Optimization
Machine Learning Algorithm

A Decentralized Federated Learning Framework via Committee Mechanism with Convergence Guarantee

Authors: Chunjiang Che, Xiaoli Li, Chuan Chen, Xiaoyu He, Zibin Zheng | Published: 2021-08-01 | Updated: 2022-09-08
Algorithm
Robustness
Federated Learning

PiBase: An IoT-based Security System using Raspberry Pi and Google Firebase

Authors: Venkat Margapuri, Niketa Penumajji, Mitchell Neilsen | Published: 2021-07-29
Algorithm
Machine Learning Algorithm
Face Recognition System

Subsequent embedding in targeted image steganalysis: Theoretical framework and practical applications

Authors: David Megías, Daniel Lerch-Hostalot | Published: 2021-07-29 | Updated: 2022-03-15
Algorithm
Experimental Validation
Watermark Robustness

Fully Homomorphically Encrypted Deep Learning as a Service

Authors: George Onoufriou, Paul Mayfield, Georgios Leontidis | Published: 2021-07-26
Algorithm
Data Dependency
Privacy Leakage

Defending SVMs against Poisoning Attacks: the Hardness and DBSCAN Approach

Authors: Hu Ding, Fan Yang, Jiawei Huang | Published: 2020-06-14 | Updated: 2021-02-20
Algorithm
Poisoning
Fundamentals of Machine Learning

Provably Robust Metric Learning

Authors: Lu Wang, Xuanqing Liu, Jinfeng Yi, Yuan Jiang, Cho-Jui Hsieh | Published: 2020-06-12 | Updated: 2020-12-19
Algorithm
Adversarial Attack Detection
Optimization Methods