BrainLeaks: On the Privacy-Preserving Properties of Neuromorphic Architectures against Model Inversion Attacks Authors: Hamed Poursiami, Ihsen Alouani, Maryam Parsa | Published: 2024-02-01 | Updated: 2024-05-07 WatermarkingPrivacy ProtectionMembership Inference 2024.02.01 2025.05.27 Literature Database
opML: Optimistic Machine Learning on Blockchain Authors: KD Conway, Cathie So, Xiaohang Yu, Kartin Wong | Published: 2024-01-31 | Updated: 2024-02-05 WatermarkingBlockchain TechnologyMachine Learning Method 2024.01.31 2025.05.27 Literature Database
Game-Theoretic Unlearnable Example Generator Authors: Shuang Liu, Yihan Wang, Xiao-Shan Gao | Published: 2024-01-31 WatermarkingBackdoor AttackPoisoning 2024.01.31 2025.05.27 Literature Database
Systematically Assessing the Security Risks of AI/ML-enabled Connected Healthcare Systems Authors: Mohammed Elnawawy, Mohammadreza Hallajiyan, Gargi Mitra, Shahrear Iqbal, Karthik Pattabiraman | Published: 2024-01-30 | Updated: 2024-04-12 WatermarkingRisk ManagementThreats of Medical AI 2024.01.30 2025.05.27 Literature Database
Data-Oblivious ML Accelerators using Hardware Security Extensions Authors: Hossam ElAtali, John Z. Jekel, Lachlan J. Gunn, N. Asokan | Published: 2024-01-29 FPGAWatermarkingData Protection Method 2024.01.29 2025.05.27 Literature Database
Blockchain-enabled Trustworthy Federated Unlearning Authors: Yijing Lin, Zhipeng Gao, Hongyang Du, Jinke Ren, Zhiqiang Xie, Dusit Niyato | Published: 2024-01-29 WatermarkingFederated LearningAdaptive Retraining Mechanism 2024.01.29 2025.05.27 Literature Database
L-AutoDA: Leveraging Large Language Models for Automated Decision-based Adversarial Attacks Authors: Ping Guo, Fei Liu, Xi Lin, Qingchuan Zhao, Qingfu Zhang | Published: 2024-01-27 | Updated: 2024-05-22 AlgorithmWatermarkingCyber Attack 2024.01.27 2025.05.27 Literature Database
Asymptotic Behavior of Adversarial Training Estimator under $\ell_\infty$-Perturbation Authors: Yiling Xie, Xiaoming Huo | Published: 2024-01-27 WatermarkingAdversarial TrainingAdaptive Adversarial Training 2024.01.27 2025.05.27 Literature Database
Training Differentially Private Ad Prediction Models with Semi-Sensitive Features Authors: Lynn Chua, Qiliang Cui, Badih Ghazi, Charlie Harrison, Pritish Kamath, Walid Krichene, Ravi Kumar, Pasin Manurangsi, Krishna Giri Narra, Amer Sinha, Avinash Varadarajan, Chiyuan Zhang | Published: 2024-01-26 AlgorithmWatermarkingPrivacy Protection Method 2024.01.26 2025.05.27 Literature Database
GuardML: Efficient Privacy-Preserving Machine Learning Services Through Hybrid Homomorphic Encryption Authors: Eugene Frimpong, Khoa Nguyen, Mindaugas Budzys, Tanveer Khan, Antonis Michalas | Published: 2024-01-26 WatermarkingPrivacy ProtectionPrivacy Protection Method 2024.01.26 2025.05.27 Literature Database