Algorithm

An energy-based model for neuro-symbolic reasoning on knowledge graphs

Authors: Dominik Dold, Josep Soler Garrido | Published: 2021-10-04
Algorithm
Performance Evaluation
Machine Learning Application

Secure Machine Learning over Relational Data

Authors: Qiyao Luo, Yilei Wang, Zhenghang Ren, Ke Yi, Kai Chen, Xiao Wang | Published: 2021-09-30
Algorithm
Data Privacy Assessment
Membership Inference

BulletTrain: Accelerating Robust Neural Network Training via Boundary Example Mining

Authors: Weizhe Hua, Yichi Zhang, Chuan Guo, Zhiru Zhang, G. Edward Suh | Published: 2021-09-29 | Updated: 2021-12-05
Algorithm
Robustness
High Difficulty Sample

Unrolling SGD: Understanding Factors Influencing Machine Unlearning

Authors: Anvith Thudi, Gabriel Deza, Varun Chandrasekaran, Nicolas Papernot | Published: 2021-09-27 | Updated: 2022-03-02
Algorithm
Performance Evaluation
Regularization

Differentially Private Aggregation in the Shuffle Model: Almost Central Accuracy in Almost a Single Message

Authors: Badih Ghazi, Ravi Kumar, Pasin Manurangsi, Rasmus Pagh, Amer Sinha | Published: 2021-09-27
Algorithm
Data Privacy Assessment
Privacy Risk Management

Morse-STF: Improved Protocols for Privacy-Preserving Machine Learning

Authors: Qizhi Zhang, Sijun Tan, Lichun Li, Yun Zhao, Dong Yin, Shan Yin | Published: 2021-09-24 | Updated: 2022-05-19
Algorithm
Machine Learning Application
Linear Model

A Novel Open Set Energy-based Flow Classifier for Network Intrusion Detection

Authors: Manuela M. C. Souza, Camila Pontes, Joao Gondim, Luis P. F. Garcia, Luiz DaSilva, Marcelo A. Marotta | Published: 2021-09-23 | Updated: 2022-04-26
Algorithm
Energy Management
Performance Evaluation

Secure PAC Bayesian Regression via Real Shamir Secret Sharing

Authors: Jaron Skovsted Gundersen, Bulut Kuskonmaz, Rafael Wisniewski | Published: 2021-09-23 | Updated: 2023-04-17
Algorithm
Privacy Risk Management
Linear Model

Machine-Learning Side-Channel Attacks on the GALACTICS Constant-Time Implementation of BLISS

Authors: Soundes Marzougui, Nils Wisiol, Patrick Gersch, Juliane Krämer, Jean-Pierre Seifert | Published: 2021-09-20 | Updated: 2022-06-08
Algorithm
Cybersecurity
Data Leakage

The mathematics of adversarial attacks in AI — Why deep learning is unstable despite the existence of stable neural networks

Authors: Alexander Bastounis, Anders C Hansen, Verner Vlačić | Published: 2021-09-13 | Updated: 2025-03-26
Algorithm
Generalization Performance
Adversarial Learning