Scalable kernel balancing weights in a nationwide observational study of hospital profit status and heart attack outcomes Authors: Kwangho Kim, Bijan A. Niknam, José R. Zubizarreta | Published: 2023-11-01 Threats of Medical AISelection and Evaluation of Optimization AlgorithmsComputational Efficiency 2023.11.01 2025.05.28 Literature Database
Unified Enhancement of Privacy Bounds for Mixture Mechanisms via $f$-Differential Privacy Authors: Chendi Wang, Buxin Su, Jiayuan Ye, Reza Shokri, Weijie J. Su | Published: 2023-10-30 | Updated: 2023-11-01 Privacy TechniqueRobustness EvaluationComputational Efficiency 2023.10.30 2025.05.28 Literature Database
Modified Genetic Algorithm for Feature Selection and Hyper Parameter Optimization: Case of XGBoost in Spam Prediction Authors: Nazeeh Ghatasheh, Ismail Altaharwa, Khaled Aldebei | Published: 2023-10-30 Spam DetectionSelection and Evaluation of Optimization AlgorithmsComputational Efficiency 2023.10.30 2025.05.28 Literature Database
Robust and Actively Secure Serverless Collaborative Learning Authors: Olive Franzese, Adam Dziedzic, Christopher A. Choquette-Choo, Mark R. Thomas, Muhammad Ahmad Kaleem, Stephan Rabanser, Congyu Fang, Somesh Jha, Nicolas Papernot, Xiao Wang | Published: 2023-10-25 Security AnalysisByzantine ResilienceComputational Efficiency 2023.10.25 2025.05.28 Literature Database
Threshold KNN-Shapley: A Linear-Time and Privacy-Friendly Approach to Data Valuation Authors: Jiachen T. Wang, Yuqing Zhu, Yu-Xiang Wang, Ruoxi Jia, Prateek Mittal | Published: 2023-08-30 | Updated: 2023-11-26 Data GenerationPrivacy Protection MethodComputational Efficiency 2023.08.30 2025.05.28 Literature Database
Machine Learning-Based Intrusion Detection: Feature Selection versus Feature Extraction Authors: Vu-Duc Ngo, Tuan-Cuong Vuong, Thien Van Luong, Hung Tran | Published: 2023-07-04 Feature Extraction MethodFeature Selection MethodComputational Efficiency 2023.07.04 2025.05.28 Literature Database
Universal adversarial perturbations for multiple classification tasks with quantum classifiers Authors: Yun-Zhong Qiu | Published: 2023-06-21 | Updated: 2023-10-25 Optimization MethodsComputational EfficiencyQuantum Cryptography Technology 2023.06.21 2025.05.28 Literature Database
Cyber Key Terrain Identification Using Adjusted PageRank Centrality Authors: Lukáš Sadlek, Pavel Čeleda | Published: 2023-06-19 | Updated: 2024-04-24 AlgorithmTime Window AnalysisComputational Efficiency 2023.06.19 2025.05.28 Literature Database
Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15 Data CollectionThreat modelingComputational Efficiency 2023.06.15 2025.05.28 Literature Database
PLAN: Variance-Aware Private Mean Estimation Authors: Martin Aumüller, Christian Janos Lebeda, Boel Nelson, Rasmus Pagh | Published: 2023-06-14 | Updated: 2024-04-10 AlgorithmPrivacy TechniqueComputational Efficiency 2023.06.14 2025.05.28 Literature Database