Training quantum machine learning models on cloud without uploading the data Authors: Guang Ping He | Published: 2024-09-06 | Updated: 2024-10-07 AlgorithmWatermarkingQuantum Framework 2024.09.06 2025.05.27 Literature Database
Comment on Revisiting Neural Program Smoothing for Fuzzing Authors: Dongdong She, Kexin Pei, Junfeng Yang, Baishakhi Ray, Suman Jana | Published: 2024-09-06 WatermarkingProgram AnalysisEvaluation Method 2024.09.06 2025.05.27 Literature Database
Poster: Developing an O-RAN Security Test Lab Authors: Sotiris Michaelides, David Rupprecht, Katharina Kohls | Published: 2024-09-02 WatermarkingCybersecuritySecurity Analysis 2024.09.02 2025.05.27 Literature Database
Defending against Model Inversion Attacks via Random Erasing Authors: Viet-Hung Tran, Ngoc-Bao Nguyen, Son T. Mai, Hans Vandierendonck, Ngai-man Cheung | Published: 2024-09-02 WatermarkingPrivacy Protection MethodDefense Method 2024.09.02 2025.05.27 Literature Database
Different Victims, Same Layout: Email Visual Similarity Detection for Enhanced Email Protection Authors: Sachin Shukla, Omid Mirzaei | Published: 2024-08-29 | Updated: 2024-09-04 WatermarkingSpam DetectionVisual Similarity Detection 2024.08.29 2025.05.27 Literature Database
Mitigating Noise Detriment in Differentially Private Federated Learning with Model Pre-training Authors: Huitong Jin, Yipeng Zhou, Laizhong Cui, Quan Z. Sheng | Published: 2024-08-18 WatermarkingPrivacy Protection MethodModel Performance Evaluation 2024.08.18 2025.05.27 Literature Database
Random Gradient Masking as a Defensive Measure to Deep Leakage in Federated Learning Authors: Joon Kim, Sejin Park | Published: 2024-08-15 WatermarkingPoisoningDefense Method 2024.08.15 2025.05.27 Literature Database
SAGE-RT: Synthetic Alignment data Generation for Safety Evaluation and Red Teaming Authors: Anurakt Kumar, Divyanshu Kumar, Jatan Loya, Nitin Aravind Birur, Tanay Baswa, Sahil Agarwal, Prashanth Harshangi | Published: 2024-08-14 WatermarkingDataset GenerationSafety Alignment 2024.08.14 2025.05.27 Literature Database
Fooling SHAP with Output Shuffling Attacks Authors: Jun Yuan, Aritra Dasgupta | Published: 2024-08-12 AI ComplianceWatermarkingBias 2024.08.12 2025.05.27 Literature Database
Lancelot: Towards Efficient and Privacy-Preserving Byzantine-Robust Federated Learning within Fully Homomorphic Encryption Authors: Siyang Jiang, Hao Yang, Qipeng Xie, Chuan Ma, Sen Wang, Guoliang Xing | Published: 2024-08-12 Integration of FL and HEWatermarkingPrivacy Protection Method 2024.08.12 2025.05.27 Literature Database