OGAN: Disrupting Deepfakes with an Adversarial Attack that Survives Training Authors: Eran Segalis, Eran Galili | Published: 2020-06-17 | Updated: 2020-11-25 Adversarial Attack MethodsMachine Learning AlgorithmImage Processing 2020.06.17 2025.05.28 Literature Database
BLAZE: Blazing Fast Privacy-Preserving Machine Learning Authors: Arpita Patra, Ajith Suresh | Published: 2020-05-18 MPC AlgorithmMachine Learning AlgorithmComputational Efficiency 2020.05.18 2025.05.28 Literature Database
Large-Scale Secure XGB for Vertical Federated Learning Authors: Wenjing Fang, Derun Zhao, Jin Tan, Chaochao Chen, Chaofan Yu, Li Wang, Lei Wang, Jun Zhou, Benyu Zhang | Published: 2020-05-18 | Updated: 2021-09-02 Machine Learning AlgorithmComputational EfficiencyFederated Learning System 2020.05.18 2025.05.28 Literature Database
Encryption Inspired Adversarial Defense for Visual Classification Authors: MaungMaung AprilPyone, Hitoshi Kiya | Published: 2020-05-16 Machine Learning AlgorithmMachine Learning MethodDefense Effectiveness Analysis 2020.05.16 2025.05.28 Literature Database
Byzantine-Resilient SGD in High Dimensions on Heterogeneous Data Authors: Deepesh Data, Suhas Diggavi | Published: 2020-05-16 AlgorithmLoss FunctionMachine Learning Algorithm 2020.05.16 2025.05.28 Literature Database
Towards Assessment of Randomized Smoothing Mechanisms for Certifying Adversarial Robustness Authors: Tianhang Zheng, Di Wang, Baochun Li, Jinhui Xu | Published: 2020-05-15 | Updated: 2020-06-07 AlgorithmMachine Learning AlgorithmMachine Learning Method 2020.05.15 2025.05.28 Literature Database
Protecting the integrity of the training procedure of neural networks Authors: Christian Berghoff | Published: 2020-05-14 Data DependencyTraining MethodMachine Learning Algorithm 2020.05.14 2025.05.28 Literature Database
Phishing URL Detection Through Top-level Domain Analysis: A Descriptive Approach Authors: Orestis Christou, Nikolaos Pitropakis, Pavlos Papadopoulos, Sean McKeown, William J. Buchanan | Published: 2020-05-13 URL analysis techniquesRandom ForestMachine Learning Algorithm 2020.05.13 2025.05.28 Literature Database
Analyzing CNN Based Behavioural Malware Detection Techniques on Cloud IaaS Authors: Andrew McDole, Mahmoud Abdelsalam, Maanak Gupta, Sudip Mittal | Published: 2020-02-15 Training MethodMalware DetectionMachine Learning Algorithm 2020.02.15 2025.05.28 Literature Database
Intelligent Methods for Accurately Detecting Phishing Websites Authors: Almaha Abuzuraiq, Mouhammd Alkasassbeh, Mohammad Almseidin | Published: 2020-01-19 Information SecurityMachine Learning AlgorithmFeature Extraction Method 2020.01.19 2025.05.28 Literature Database