A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07 Security AnalysisPrivacy Risk ManagementComputational Efficiency 2022.10.20 2025.05.28 Literature Database
New Secure Sparse Inner Product with Applications to Machine Learning Authors: Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu | Published: 2022-10-16 Security AnalysisCryptographyComputational Efficiency 2022.10.16 2025.05.28 Literature Database
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder Authors: Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li | Published: 2022-10-16 Multi-Party ComputationCryptographyComputational Efficiency 2022.10.16 2025.05.28 Literature Database
Suppressing Poisoning Attacks on Federated Learning for Medical Imaging Authors: Naif Alkhunaizi, Dmitry Kamzolov, Martin Takáč, Karthik Nandakumar | Published: 2022-07-15 Byzantine ResiliencePoisoning AttackComputational Efficiency 2022.07.15 2025.05.28 Literature Database
How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28 Algorithm DesignAdversarial ExampleComputational Efficiency 2022.06.28 2025.05.28 Literature Database
Parallel Instance Filtering for Malware Detection Authors: Martin Jureček, Olha Jurečková | Published: 2022-06-28 Algorithm DesignComputational EfficiencyStatic Analysis 2022.06.28 2025.05.28 Literature Database
Unlocking High-Accuracy Differentially Private Image Classification through Scale Authors: Soham De, Leonard Berrada, Jamie Hayes, Samuel L. Smith, Borja Balle | Published: 2022-04-28 | Updated: 2022-06-16 Privacy Protection MethodModel DesignComputational Efficiency 2022.04.28 2025.05.28 Literature Database
CrypTen: Secure Multi-Party Computation Meets Machine Learning Authors: Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, Laurens van der Maaten | Published: 2021-09-02 | Updated: 2022-09-15 Membership InferenceMachine Learning MethodComputational Efficiency 2021.09.02 2025.05.28 Literature Database
Guarding Machine Learning Hardware Against Physical Side-Channel Attacks Authors: Anuj Dubey, Rosario Cammarota, Vikram Suresh, Aydin Aysu | Published: 2021-09-01 WatermarkingComputational EfficiencyDefense Mechanism 2021.09.01 2025.05.28 Literature Database
OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations Authors: Pengcheng Jiang, Kenji Tei | Published: 2021-08-16 | Updated: 2021-11-02 AlgorithmModule ReconfigurationComputational Efficiency 2021.08.16 2025.05.28 Literature Database