Understanding Reconstruction Attacks with the Neural Tangent Kernel and Dataset Distillation Authors: Noel Loo, Ramin Hasani, Mathias Lechner, Alexander Amini, Daniela Rus | Published: 2023-02-02 | Updated: 2023-11-09 Privacy Enhancing TechnologyModel Performance EvaluationReconstruction Durability 2023.02.02 2025.05.28 Literature Database
On the Efficacy of Differentially Private Few-shot Image Classification Authors: Marlon Tobaben, Aliaksandra Shysheya, John Bronskill, Andrew Paverd, Shruti Tople, Santiago Zanella-Beguelin, Richard E Turner, Antti Honkela | Published: 2023-02-02 | Updated: 2023-12-19 Few-Shot LearningPrivacy Enhancing TechnologyModel Performance Evaluation 2023.02.02 2025.05.28 Literature Database
Behavioural Reports of Multi-Stage Malware Authors: Marcus Carpenter, Chunbo Luo | Published: 2023-01-30 Data CollectionModel Performance EvaluationDynamic Analysis 2023.01.30 2025.05.28 Literature Database
Command Line Interface Risk Modeling Authors: Dr Anthony L. Faulds | Published: 2023-01-17 Privacy Enhancing TechnologyModel Performance EvaluationFeature Importance Analysis 2023.01.17 2025.05.28 Literature Database
Statement-Level Vulnerability Detection: Learning Vulnerability Patterns Through Information Theory and Contrastive Learning Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, Michael Fu, John Grundy, Hung Nguyen, Seyit Camtepe, Paul Quirk, Dinh Phung | Published: 2022-09-20 | Updated: 2024-06-12 Model Performance EvaluationImprovement of LearningVulnerability Mitigation Technique 2022.09.20 2025.05.28 Literature Database
Cross Project Software Vulnerability Detection via Domain Adaptation and Max-Margin Principle Authors: Van Nguyen, Trung Le, Chakkrit Tantithamthavorn, John Grundy, Hung Nguyen, Dinh Phung | Published: 2022-09-19 Model Performance EvaluationImprovement of LearningPerformance Evaluation 2022.09.19 2025.05.28 Literature Database
A Secure Healthcare 5.0 System Based on Blockchain Technology Entangled with Federated Learning Technique Authors: Abdur Rehman, Sagheer Abbas, M. A. Khan, Taher M. Ghazal, Khan Muhammad Adnan, Amir Mosavi | Published: 2022-09-16 Blockchain TechnologyModel Performance EvaluationMedical Monitoring System 2022.09.16 2025.05.28 Literature Database
Detection of Malicious Websites Using Machine Learning Techniques Authors: Adebayo Oshingbesan, Courage Ekoh, Chukwuemeka Okobi, Aime Munezero, Kagame Richard | Published: 2022-09-13 Dataset GenerationModel Performance EvaluationMachine Learning 2022.09.13 2025.05.28 Literature Database
Data Provenance via Differential Auditing Authors: Xin Mu, Ming Pang, Feida Zhu | Published: 2022-09-04 Data Origins and EvolutionPrivacy Enhancing TechnologyModel Performance Evaluation 2022.09.04 2025.05.28 Literature Database
Group Property Inference Attacks Against Graph Neural Networks Authors: Xiuling Wang, Wendy Hui Wang | Published: 2022-09-02 Membership InferenceModel Performance EvaluationAdversarial Attack Methods 2022.09.02 2025.05.28 Literature Database