A Theoretical View of Linear Backpropagation and Its Convergence Authors: Ziang Li, Yiwen Guo, Haodi Liu, Changshui Zhang | Published: 2021-12-21 | Updated: 2024-01-10 Model DesignConvergence AnalysisDefense Method 2021.12.21 2025.05.28 Literature Database
ML Supported Predictions for SAT Solvers Performance Authors: A. -M. Leventi-Peetz, Jörg-Volker Peetz, Martina Rohde | Published: 2021-12-17 Model DesignPerformance Evaluation MetricsMachine Learning Method 2021.12.17 2025.05.28 Literature Database
Utilizing XAI technique to improve autoencoder based model for computer network anomaly detection with shapley additive explanation(SHAP) Authors: Khushnaseeb Roshan, Aasim Zafar | Published: 2021-12-14 Data CollectionModel DesignMachine Learning Method 2021.12.14 2025.05.28 Literature Database
Blind Faith: Privacy-Preserving Machine Learning using Function Approximation Authors: Tanveer Khan, Alexandros Bakas, Antonis Michalas | Published: 2021-07-29 Privacy LeakageModel DesignMachine Learning Algorithm 2021.07.29 2025.05.28 Literature Database
Leveraging Sharing Communities to Achieve Federated Learning for Cybersecurity Authors: Frank W. Bentrem, Michael A. Corsello, Joshua J. Palm | Published: 2021-04-23 | Updated: 2021-04-27 Automation of CybersecurityModel DesignMachine Learning Technology 2021.04.23 2025.05.28 Literature Database
CryptGPU: Fast Privacy-Preserving Machine Learning on the GPU Authors: Sijun Tan, Brian Knott, Yuan Tian, David J. Wu | Published: 2021-04-22 Privacy ProtectionModel DesignEncryption Technology 2021.04.22 2025.05.28 Literature Database
Patch Shortcuts: Interpretable Proxy Models Efficiently Find Black-Box Vulnerabilities Authors: Julia Rosenzweig, Joachim Sicking, Sebastian Houben, Michael Mock, Maram Akila | Published: 2021-04-22 Multi-Class ClassificationModel DesignFeature Engineering 2021.04.22 2025.05.28 Literature Database
Mapping the Internet: Modelling Entity Interactions in Complex Heterogeneous Networks Authors: Simon Mandlik, Tomas Pevny | Published: 2021-04-19 | Updated: 2022-06-08 PoisoningModel DesignMachine Learning Technology 2021.04.19 2025.05.28 Literature Database
Vectorized Secure Evaluation of Decision Forests Authors: Raghav Malik, Vidush Singhal, Benjamin Gottfried, Milind Kulkarni | Published: 2021-04-19 Privacy ProtectionModel DesignEncryption Technology 2021.04.19 2025.05.28 Literature Database
Orthogonalizing Convolutional Layers with the Cayley Transform Authors: Asher Trockman, J. Zico Kolter | Published: 2021-04-14 Model DesignResource optimizationMachine Learning Technology 2021.04.14 2025.05.28 Literature Database