IoT Data Analytics in Dynamic Environments: From An Automated Machine Learning Perspective Authors: Li Yang, Abdallah Shami | Published: 2022-09-16 IoT Data Analysis TaskAlgorithmImprovement of Learning 2022.09.16 2025.05.28 Literature Database
Deepfake histological images for enhancing digital pathology Authors: Kianoush Falahkheirkhah, Saumya Tiwari, Kevin Yeh, Sounak Gupta, Loren Herrera-Hernandez, Michael R. McCarthy, Rafael E. Jimenez, John C. Cheville, Rohit Bhargava | Published: 2022-06-16 AlgorithmThreats of Medical AIPerformance Evaluation 2022.06.16 2025.05.28 Literature Database
On Private Online Convex Optimization: Optimal Algorithms in $\ell_p$-Geometry and High Dimensional Contextual Bandits Authors: Yuxuan Han, Zhicong Liang, Zhipeng Liang, Yang Wang, Yuan Yao, Jiheng Zhang | Published: 2022-06-16 AlgorithmOnline Decision MakingPerformance Evaluation 2022.06.16 2025.05.28 Literature Database
BlindFL: Vertical Federated Machine Learning without Peeking into Your Data Authors: Fangcheng Fu, Huanran Xue, Yong Cheng, Yangyu Tao, Bin Cui | Published: 2022-06-16 AlgorithmPrivacy Enhancing ProtocolMulti-Party Computation 2022.06.16 2025.05.28 Literature Database
HyperImpute: Generalized Iterative Imputation with Automatic Model Selection Authors: Daniel Jarrett, Bogdan Cebere, Tennison Liu, Alicia Curth, Mihaela van der Schaar | Published: 2022-06-15 AlgorithmHyperparameter TuningPerformance Evaluation Metrics 2022.06.15 2025.05.28 Literature Database
Differentially Private Sampling from Rashomon Sets, and the Universality of Langevin Diffusion for Convex Optimization Authors: Arun Ganesh, Abhradeep Thakurta, Jalaj Upadhyay | Published: 2022-04-04 | Updated: 2023-08-28 AlgorithmPrivacy Protection MechanismPrivacy Assessment 2022.04.04 2025.05.28 Literature Database
Byzantine-Robust Federated Linear Bandits Authors: Ali Jadbabaie, Haochuan Li, Jian Qian, Yi Tian | Published: 2022-04-03 AlgorithmPrivacy Protection MechanismDistributed Learning 2022.04.03 2025.05.28 Literature Database
Ransomware Detection using Process Memory Authors: Avinash Singh, Richard Adeyemi Ikuesan, Hein Venter | Published: 2022-03-31 AlgorithmData PreprocessingMachine Learning 2022.03.31 2025.05.28 Literature Database
Facial Information Analysis Technology for Gender and Age Estimation Authors: Gilheum Park, Sua Jung | Published: 2021-11-17 AlgorithmMachine LearningAttack that Analyzes Images with AI to Infer Personal Information 2021.11.17 2025.05.28 Literature Database
An Adaptive Honeypot Configuration, Deployment and Maintenance Strategy Authors: Daniel Fraunholz, Marc Zimmermann, Hans D. Schotten | Published: 2021-11-06 ICS Honeypot DevelopmentAlgorithmAdaptive Adversarial Training 2021.11.06 2025.05.28 Literature Database