Collaborative Heterogeneous Causal Inference Beyond Meta-analysis Authors: Tianyu Guo, Sai Praneeth Karimireddy, Michael I. Jordan | Published: 2024-04-24 AlgorithmWatermarkingBias 2024.04.24 2025.05.27 Literature Database
A Customer Level Fraudulent Activity Detection Benchmark for Enhancing Machine Learning Model Research and Evaluation Authors: Phoebe Jing, Yijing Gao, Xianlong Zeng | Published: 2024-04-23 WatermarkingData Privacy AssessmentMachine Learning Method 2024.04.23 2025.05.27 Literature Database
PristiQ: A Co-Design Framework for Preserving Data Security of Quantum Learning in the Cloud Authors: Zhepeng Wang, Yi Sheng, Nirajan Koirala, Kanad Basu, Taeho Jung, Cheng-Chang Lu, Weiwen Jiang | Published: 2024-04-20 WatermarkingQuantum FrameworkQuantum Cryptography Technology 2024.04.20 2025.05.27 Literature Database
DeviceRadar: Online IoT Device Fingerprinting in ISPs using Programmable Switches Authors: Ruoyu Li, Qing Li, Tao Lin, Qingsong Zou, Dan Zhao, Yucheng Huang, Gareth Tyson, Guorui Xie, Yong Jiang | Published: 2024-04-19 DDoS Attack DetectionIoT Device IdentificationWatermarking 2024.04.19 2025.05.27 Literature Database
Privacy-Preserving UCB Decision Process Verification via zk-SNARKs Authors: Xikun Jiang, He Lyu, Chenhao Ying, Yibin Xu, Boris Düdder, Yuan Luo | Published: 2024-04-18 | Updated: 2024-06-06 AlgorithmWatermarkingPrivacy Protection 2024.04.18 2025.05.27 Literature Database
Decomposing and Editing Predictions by Modeling Model Computation Authors: Harshay Shah, Andrew Ilyas, Aleksander Madry | Published: 2024-04-17 WatermarkingModel InterpretabilityModel editing techniques 2024.04.17 2025.05.27 Literature Database
OmniLytics+: A Secure, Efficient, and Affordable Blockchain Data Market for Machine Learning through Off-Chain Processing Authors: Songze Li, Mingzhe Liu, Mengqi Chen | Published: 2024-04-17 WatermarkingPrivacy Protection MethodBlockchain Technology 2024.04.17 2025.05.27 Literature Database
Federated Learning on Riemannian Manifolds with Differential Privacy Authors: Zhenwei Huang, Wen Huang, Pratik Jawanpuria, Bamdev Mishra | Published: 2024-04-15 WatermarkingPrivacy Protection MethodConvergence Analysis 2024.04.15 2025.05.27 Literature Database
Make Split, not Hijack: Preventing Feature-Space Hijacking Attacks in Split Learning Authors: Tanveer Khan, Mindaugas Budzys, Antonis Michalas | Published: 2024-04-14 WatermarkingTraining ProtocolPrivacy Protection Method 2024.04.14 2025.05.27 Literature Database
Empowering Malware Detection Efficiency within Processing-in-Memory Architecture Authors: Sreenitha Kasarapu, Sathwika Bavikadi, Sai Manoj Pudukotai Dinakarrao | Published: 2024-04-12 WatermarkingMalware ClassificationComputational Efficiency 2024.04.12 2025.05.27 Literature Database