Asynchronous Byzantine Machine Learning (the case of SGD) Authors: Georgios Damaskinos, El Mahdi El Mhamdi, Rachid Guerraoui, Rhicheek Patra, Mahsa Taziki | Published: 2018-02-22 | Updated: 2018-07-09 Methods to Address Dynamic Byzantine BehaviorMachine Learning MethodAdaptive Learning Rate 2018.02.22 2025.05.28 Literature Database
The Hidden Vulnerability of Distributed Learning in Byzantium Authors: El Mahdi El Mhamdi, Rachid Guerraoui, Sébastien Rouault | Published: 2018-02-22 | Updated: 2018-07-17 PoisoningAdversarial attackMachine Learning Method 2018.02.22 2025.05.28 Literature Database
Shield: Fast, Practical Defense and Vaccination for Deep Learning using JPEG Compression Authors: Nilaksh Das, Madhuri Shanbhogue, Shang-Tse Chen, Fred Hohman, Siwei Li, Li Chen, Michael E. Kounavis, Duen Horng Chau | Published: 2018-02-19 Certified RobustnessAdversarial attackMachine Learning Method 2018.02.19 2025.05.28 Literature Database
Actions Speak Louder Than Goals: Valuing Player Actions in Soccer Authors: Tom Decroos, Lotte Bransen, Jan Van Haaren, Jesse Davis | Published: 2018-02-18 | Updated: 2019-07-10 Privacy ManagementUser Behavior AnalysisMachine Learning Method 2018.02.18 2025.05.28 Literature Database
Generative Models for Spear Phishing Posts on Social Media Authors: John Seymour, Philip Tully | Published: 2018-02-14 Data CollectionUser Activity AnalysisMachine Learning Method 2018.02.14 2025.05.28 Literature Database
Distributed One-class Learning Authors: Ali Shahin Shamsabadi, Hamed Haddadi, Andrea Cavallaro | Published: 2018-02-10 Privacy Protection MechanismAdversarial LearningMachine Learning Method 2018.02.10 2025.05.28 Literature Database
URLNet: Learning a URL Representation with Deep Learning for Malicious URL Detection Authors: Hung Le, Quang Pham, Doyen Sahoo, Steven C. H. Hoi | Published: 2018-02-09 | Updated: 2018-03-02 Membership InferenceModel InversionMachine Learning Method 2018.02.09 2025.05.28 Literature Database
A Game-Theoretic Approach to Design Secure and Resilient Distributed Support Vector Machines Authors: Rui Zhang, Quanyan Zhu | Published: 2018-02-07 Multi-Objective OptimizationAdversarial attackMachine Learning Method 2018.02.07 2025.05.28 Literature Database
CryptoRec: Privacy-preserving Recommendation as a Service Authors: Jun Wang, Afonso Arriaga, Qiang Tang, Peter Y. A. Ryan | Published: 2018-02-07 | Updated: 2018-05-13 Privacy Protection MechanismDifferential PrivacyMachine Learning Method 2018.02.07 2025.05.28 Literature Database
ModelChain: Decentralized Privacy-Preserving Healthcare Predictive Modeling Framework on Private Blockchain Networks Authors: Tsung-Ting Kuo, Lucila Ohno-Machado | Published: 2018-02-06 Privacy Protection MechanismBlockchain IntegrationMachine Learning Method 2018.02.06 2025.05.28 Literature Database