OD-Stega: LLM-Based Near-Imperceptible Steganography via Optimized Distributions Authors: Yu-Shin Huang, Peter Just, Krishna Narayanan, Chao Tian | Published: 2024-10-06 Text Generation MethodOptimization Problem 2024.10.06 2025.05.27 Literature Database
DiSK: Differentially Private Optimizer with Simplified Kalman Filter for Noise Reduction Authors: Xinwei Zhang, Zhiqi Bu, Borja Balle, Mingyi Hong, Meisam Razaviyayn, Vahab Mirrokni | Published: 2024-10-04 | Updated: 2025-04-29 FrameworkOptimization Problem 2024.10.04 2025.05.27 Literature Database
Enhancing Robustness of Graph Neural Networks through p-Laplacian Authors: Anuj Kumar Sirohi, Subhanu Halder, Kabir Kumar, Sandeep Kumar | Published: 2024-09-27 Optimization ProblemDefense Method 2024.09.27 2025.05.27 Literature Database
Obsidian: Cooperative State-Space Exploration for Performant Inference on Secure ML Accelerators Authors: Sarbartha Banerjee, Shijia Wei, Prakash Ramrakhyani, Mohit Tiwari | Published: 2024-09-04 Energy ManagementMemory Management MethodOptimization Problem 2024.09.04 2025.05.27 Literature Database
FedMADE: Robust Federated Learning for Intrusion Detection in IoT Networks Using a Dynamic Aggregation Method Authors: Shihua Sun, Pragya Sharma, Kenechukwu Nwodo, Angelos Stavrou, Haining Wang | Published: 2024-08-13 Client ClusteringPoisoningOptimization Problem 2024.08.13 2025.05.27 Literature Database
OTAD: An Optimal Transport-Induced Robust Model for Agnostic Adversarial Attack Authors: Kuo Gai, Sicong Wang, Shihua Zhang | Published: 2024-08-01 Adversarial TrainingOptimization ProblemDefense Method 2024.08.01 2025.05.27 Literature Database
Theoretical Analysis of Privacy Leakage in Trustworthy Federated Learning: A Perspective from Linear Algebra and Optimization Theory Authors: Xiaojin Zhang, Wei Chen | Published: 2024-07-23 Privacy ProtectionPrivacy Protection MethodOptimization Problem 2024.07.23 2025.05.27 Literature Database
Provable Robustness of (Graph) Neural Networks Against Data Poisoning and Backdoor Attacks Authors: Lukas Gosch, Mahalakshmi Sabanayagam, Debarghya Ghoshdastidar, Stephan Günnemann | Published: 2024-07-15 | Updated: 2024-10-14 Backdoor AttackPoisoningOptimization Problem 2024.07.15 2025.05.27 Literature Database
How to beat a Bayesian adversary Authors: Zihan Ding, Kexin Jin, Jonas Latz, Chenguang Liu | Published: 2024-07-11 Convergence AnalysisAdversarial TrainingOptimization Problem 2024.07.11 2025.05.27 Literature Database
Approximating Two-Layer ReLU Networks for Hidden State Analysis in Differential Privacy Authors: Antti Koskela | Published: 2024-07-05 | Updated: 2024-10-11 Privacy Protection MethodLoss FunctionOptimization Problem 2024.07.05 2025.05.27 Literature Database