Regularization for Adversarial Robust Learning Authors: Jie Wang, Rui Gao, Yao Xie | Published: 2024-08-19 | Updated: 2024-08-22 AlgorithmPoisoningRegularization 2024.08.19 2025.05.27 Literature Database
Fast John Ellipsoid Computation with Differential Privacy Optimization Authors: Jiuxiang Gu, Xiaoyu Li, Yingyu Liang, Zhenmei Shi, Zhao Song, Junwei Yu | Published: 2024-08-12 AlgorithmPrivacy Protection MethodConvergence Guarantee 2024.08.12 2025.05.27 Literature Database
Malicious Internet Entity Detection Using Local Graph Inference Authors: Simon Mandlik, Tomas Pevny, Vaclav Smidl, Lukas Bajer | Published: 2024-08-06 | Updated: 2024-08-07 AlgorithmGraph TransformationEvaluation Method 2024.08.06 2025.05.27 Literature Database
Quantum Clustering for Cybersecurity Authors: Walid El Maouaki, Nouhaila Innan, Alberto Marchisio, Taoufik Said, Mohamed Bennai, Muhammad Shafique | Published: 2024-08-05 AlgorithmCybersecurityQuantum Framework 2024.08.05 2025.05.27 Literature Database
Verification of Machine Unlearning is Fragile Authors: Binchi Zhang, Zihan Chen, Cong Shen, Jundong Li | Published: 2024-08-01 AlgorithmModel Performance EvaluationComputational Efficiency 2024.08.01 2025.05.27 Literature Database
A Hybrid Federated Kernel Regularized Least Squares Algorithm Authors: Celeste Damiani, Yulia Rodina, Sergio Decherchi | Published: 2024-07-24 AlgorithmWatermarkingComputational Efficiency 2024.07.24 2025.05.27 Literature Database
Contrastive explainable clustering with differential privacy Authors: Dung Nguyen, Ariel Vetzler, Sarit Kraus, Anil Vullikanti | Published: 2024-06-07 AlgorithmWatermarkingPrivacy Protection Method 2024.06.07 2025.05.27 Literature Database
Large Language Models as Carriers of Hidden Messages Authors: Jakub Hoscilowicz, Pawel Popiolek, Jan Rudkowski, Jedrzej Bieniasz, Artur Janicki | Published: 2024-06-04 | Updated: 2025-05-05 AlgorithmFingerprinting MethodWatermark Design 2024.06.04 2025.05.27 Literature Database
Efficient Black-box Adversarial Attacks via Bayesian Optimization Guided by a Function Prior Authors: Shuyu Cheng, Yibo Miao, Yinpeng Dong, Xiao Yang, Xiao-Shan Gao, Jun Zhu | Published: 2024-05-29 AlgorithmAttack MethodOptimization Problem 2024.05.29 2025.05.27 Literature Database
Can Implicit Bias Imply Adversarial Robustness? Authors: Hancheng Min, René Vidal | Published: 2024-05-24 | Updated: 2024-06-05 AlgorithmBiasAdversarial Training 2024.05.24 2025.05.27 Literature Database