Host-Based Network Intrusion Detection via Feature Flattening and Two-stage Collaborative Classifier Authors: Zhiyan Chen, Murat Simsek, Burak Kantarci, Mehran Bagheri, Petar Djukic | Published: 2023-06-15 Data CollectionThreat modelingComputational Efficiency 2023.06.15 2025.05.28 Literature Database
PLAN: Variance-Aware Private Mean Estimation Authors: Martin Aumüller, Christian Janos Lebeda, Boel Nelson, Rasmus Pagh | Published: 2023-06-14 | Updated: 2024-04-10 AlgorithmPrivacy TechniqueComputational Efficiency 2023.06.14 2025.05.28 Literature Database
Fast and Private Inference of Deep Neural Networks by Co-designing Activation Functions Authors: Abdulrahman Diaa, Lucas Fenaux, Thomas Humphries, Marian Dietz, Faezeh Ebrahimianghazani, Bailey Kacsmar, Xinda Li, Nils Lukas, Rasoul Akhavan Mahdavi, Simon Oya, Ehsan Amjadian, Florian Kerschbaum | Published: 2023-06-14 | Updated: 2024-04-16 AlgorithmMembership InferenceComputational Efficiency 2023.06.14 2025.05.28 Literature Database
Privacy-Aware Compression for Federated Learning Through Numerical Mechanism Design Authors: Chuan Guo, Kamalika Chaudhuri, Pierre Stock, Mike Rabbat | Published: 2022-11-08 | Updated: 2023-08-10 Privacy Protection MethodOptimization MethodsComputational Efficiency 2022.11.08 2025.05.28 Literature Database
A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07 Security AnalysisPrivacy Risk ManagementComputational Efficiency 2022.10.20 2025.05.28 Literature Database
New Secure Sparse Inner Product with Applications to Machine Learning Authors: Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu | Published: 2022-10-16 Security AnalysisCryptographyComputational Efficiency 2022.10.16 2025.05.28 Literature Database
VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder Authors: Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li | Published: 2022-10-16 Multi-Party ComputationCryptographyComputational Efficiency 2022.10.16 2025.05.28 Literature Database
Suppressing Poisoning Attacks on Federated Learning for Medical Imaging Authors: Naif Alkhunaizi, Dmitry Kamzolov, Martin Takáč, Karthik Nandakumar | Published: 2022-07-15 Byzantine ResiliencePoisoning AttackComputational Efficiency 2022.07.15 2025.05.28 Literature Database
How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28 Algorithm DesignAdversarial ExampleComputational Efficiency 2022.06.28 2025.05.28 Literature Database
Parallel Instance Filtering for Malware Detection Authors: Martin Jureček, Olha Jurečková | Published: 2022-06-28 Algorithm DesignComputational EfficiencyStatic Analysis 2022.06.28 2025.05.28 Literature Database