Algorithm

IoT Data Analytics in Dynamic Environments: From An Automated Machine Learning Perspective

Authors: Li Yang, Abdallah Shami | Published: 2022-09-16
IoT Data Analysis Task
Algorithm
Improvement of Learning

Deepfake histological images for enhancing digital pathology

Authors: Kianoush Falahkheirkhah, Saumya Tiwari, Kevin Yeh, Sounak Gupta, Loren Herrera-Hernandez, Michael R. McCarthy, Rafael E. Jimenez, John C. Cheville, Rohit Bhargava | Published: 2022-06-16
Algorithm
Threats of Medical AI
Performance Evaluation

On Private Online Convex Optimization: Optimal Algorithms in $\ell_p$-Geometry and High Dimensional Contextual Bandits

Authors: Yuxuan Han, Zhicong Liang, Zhipeng Liang, Yang Wang, Yuan Yao, Jiheng Zhang | Published: 2022-06-16
Algorithm
Online Decision Making
Performance Evaluation

BlindFL: Vertical Federated Machine Learning without Peeking into Your Data

Authors: Fangcheng Fu, Huanran Xue, Yong Cheng, Yangyu Tao, Bin Cui | Published: 2022-06-16
Algorithm
Privacy Enhancing Protocol
Multi-Party Computation

HyperImpute: Generalized Iterative Imputation with Automatic Model Selection

Authors: Daniel Jarrett, Bogdan Cebere, Tennison Liu, Alicia Curth, Mihaela van der Schaar | Published: 2022-06-15
Algorithm
Hyperparameter Tuning
Performance Evaluation Metrics

Differentially Private Sampling from Rashomon Sets, and the Universality of Langevin Diffusion for Convex Optimization

Authors: Arun Ganesh, Abhradeep Thakurta, Jalaj Upadhyay | Published: 2022-04-04 | Updated: 2023-08-28
Algorithm
Privacy Protection Mechanism
Privacy Assessment

Byzantine-Robust Federated Linear Bandits

Authors: Ali Jadbabaie, Haochuan Li, Jian Qian, Yi Tian | Published: 2022-04-03
Algorithm
Privacy Protection Mechanism
Distributed Learning

Ransomware Detection using Process Memory

Authors: Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter | Published: 2022-03-31
Algorithm
Data Preprocessing
Machine Learning

Facial Information Analysis Technology for Gender and Age Estimation

Authors: Gilheum Park, Sua Jung | Published: 2021-11-17
Algorithm
Machine Learning
Attack that Analyzes Images with AI to Infer Personal Information

An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy

Authors: Daniel Fraunholz, Marc Zimmermann, Hans D. Schotten | Published: 2021-11-06
ICS Honeypot Development
Algorithm
Adaptive Adversarial Training