Optimization Problem

OD-Stega: LLM-Based Near-Imperceptible Steganography via Optimized Distributions

Authors: Yu-Shin Huang, Peter Just, Krishna Narayanan, Chao Tian | Published: 2024-10-06
Text Generation Method
Optimization Problem

DiSK: Differentially Private Optimizer with Simplified Kalman Filter for Noise Reduction

Authors: Xinwei Zhang, Zhiqi Bu, Borja Balle, Mingyi Hong, Meisam Razaviyayn, Vahab Mirrokni | Published: 2024-10-04 | Updated: 2025-04-29
Framework
Optimization Problem

Enhancing Robustness of Graph Neural Networks through p-Laplacian

Authors: Anuj Kumar Sirohi, Subhanu Halder, Kabir Kumar, Sandeep Kumar | Published: 2024-09-27
Optimization Problem
Defense Method

Obsidian: Cooperative State-Space Exploration for Performant Inference on Secure ML Accelerators

Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2024-09-04
Energy Management
Memory Management Method
Optimization Problem

FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method

Authors: Shihua Sun, Pragya Sharma, Kenechukwu Nwodo, Angelos Stavrou, Haining Wang | Published: 2024-08-13
Client Clustering
Poisoning
Optimization Problem

OTAD: An Optimal Transport-Induced Robust Model for Agnostic Adversarial Attack

Authors: Kuo Gai, Sicong Wang, Shihua Zhang | Published: 2024-08-01
Adversarial Training
Optimization Problem
Defense Method

Theoretical Analysis of Privacy Leakage in Trustworthy Federated Learning: A Perspective from Linear Algebra and Optimization Theory

Authors: Xiaojin Zhang, Wei Chen | Published: 2024-07-23
Privacy Protection
Privacy Protection Method
Optimization Problem

Provable Robustness of (Graph) Neural Networks Against Data Poisoning and Backdoor Attacks

Authors: Lukas Gosch, Mahalakshmi Sabanayagam, Debarghya Ghoshdastidar, Stephan Günnemann | Published: 2024-07-15 | Updated: 2024-10-14
Backdoor Attack
Poisoning
Optimization Problem

How to beat a Bayesian adversary

Authors: Zihan Ding, Kexin Jin, Jonas Latz, Chenguang Liu | Published: 2024-07-11
Convergence Analysis
Adversarial Training
Optimization Problem

Approximating Two-Layer ReLU Networks for Hidden State Analysis in Differential Privacy

Authors: Antti Koskela | Published: 2024-07-05 | Updated: 2024-10-11
Privacy Protection Method
Loss Function
Optimization Problem