Differentially Private Sliced Inverse Regression: Minimax Optimality and Algorithm Authors: Xintao Xia, Linjun Zhang, Zhanrui Cai | Published: 2024-01-16 AlgorithmAlgorithm DesignPrivacy Protection Method 2024.01.16 2025.05.27 Literature Database
Machine Learning-Based Malicious Vehicle Detection for Security Threats and Attacks in Vehicle Ad-hoc Network (VANET) Communications Authors: Thanh Nguyen Canh, Xiem HoangVan | Published: 2024-01-16 DoS MitigationAlgorithmMalicious Node Detection 2024.01.16 2025.05.27 Literature Database
Smuche: Scalar-Multiplicative Caching in Homomorphic Encryption Authors: Dongfang Zhao | Published: 2023-12-26 AlgorithmWatermarkingCryptography 2023.12.26 2025.05.27 Literature Database
Towards an in-depth detection of malware using distributed QCNN Authors: Tony Quertier, Grégoire Barrué | Published: 2023-12-19 AlgorithmModel Performance EvaluationQuantum Machine Learning 2023.12.19 2025.05.27 Literature Database
Android Malware Detection with Unbiased Confidence Guarantees Authors: Harris Papadopoulos, Nestoras Georgiou, Charalambos Eliades, Andreas Konstantinidis | Published: 2023-12-17 AlgorithmWatermarkingClass Imbalance 2023.12.17 2025.05.27 Literature Database
Adversarial Attacks on Combinatorial Multi-Armed Bandits Authors: Rishab Balasubramanian, Jiawei Li, Prasad Tadepalli, Huazheng Wang, Qingyun Wu, Haoyu Zhao | Published: 2023-10-08 | Updated: 2024-06-04 AlgorithmWatermarkingMachine Learning Method 2023.10.08 2025.05.28 Literature Database
Performance evaluation of Machine learning algorithms for Intrusion Detection System Authors: Sudhanshu Sekhar Tripathy, Bichitrananda Behera | Published: 2023-10-01 AlgorithmClassification Pattern AnalysisEvaluation Method 2023.10.01 2025.05.28 Literature Database
A Primer on Bayesian Neural Networks: Review and Debates Authors: Julyan Arbel, Konstantinos Pitas, Mariia Vladimirova, Vincent Fortuin | Published: 2023-09-28 AlgorithmSampling MethodModel Selection 2023.09.28 2025.05.28 Literature Database
FRAMU: Attention-based Machine Unlearning using Federated Reinforcement Learning Authors: Thanveer Shaik, Xiaohui Tao, Lin Li, Haoran Xie, Taotao Cai, Xiaofeng Zhu, Qing Li | Published: 2023-09-19 | Updated: 2024-02-02 AlgorithmPrivacy TechniqueFederated Learning 2023.09.19 2025.05.28 Literature Database
Adversarial Training Should Be Cast as a Non-Zero-Sum Game Authors: Alexander Robey, Fabian Latorre, George J. Pappas, Hamed Hassani, Volkan Cevher | Published: 2023-06-19 | Updated: 2024-03-18 AlgorithmAdversarial ExampleOptimization Methods 2023.06.19 2025.05.28 Literature Database