Computational Efficiency

A Comprehensive Survey on Edge Data Integrity Verification: Fundamentals and Future Trends

Authors: Yao Zhao, Youyang Qu, Yong Xiang, Md Palash Uddin, Dezhong Peng, Longxiang Gao | Published: 2022-10-20 | Updated: 2024-08-07
Security Analysis
Privacy Risk Management
Computational Efficiency

New Secure Sparse Inner Product with Applications to Machine Learning

Authors: Guowen Xu, Shengmin Xu, Jianting Ning, Tianwei Zhang, Xinyi Huang, Hongwei Li, Rongxing Lu | Published: 2022-10-16
Security Analysis
Cryptography
Computational Efficiency

VerifyML: Obliviously Checking Model Fairness Resilient to Malicious Model Holder

Authors: Guowen Xu, Xingshuo Han, Gelei Deng, Tianwei Zhang, Shengmin Xu, Jianting Ning, Anjia Yang, Hongwei Li | Published: 2022-10-16
Multi-Party Computation
Cryptography
Computational Efficiency

Suppressing Poisoning Attacks on Federated Learning for Medical Imaging

Authors: Naif Alkhunaizi, Dmitry Kamzolov, Martin Takáč, Karthik Nandakumar | Published: 2022-07-15
Byzantine Resilience
Poisoning Attack
Computational Efficiency

How to Steer Your Adversary: Targeted and Efficient Model Stealing Defenses with Gradient Redirection

Authors: Mantas Mazeika, Bo Li, David Forsyth | Published: 2022-06-28
Algorithm Design
Adversarial Example
Computational Efficiency

Parallel Instance Filtering for Malware Detection

Authors: Martin Jureček, Olha Jurečková | Published: 2022-06-28
Algorithm Design
Computational Efficiency
Static Analysis

Unlocking High-Accuracy Differentially Private Image Classification through Scale

Authors: Soham De, Leonard Berrada, Jamie Hayes, Samuel L. Smith, Borja Balle | Published: 2022-04-28 | Updated: 2022-06-16
Privacy Protection Method
Model Design
Computational Efficiency

CrypTen: Secure Multi-Party Computation Meets Machine Learning

Authors: Brian Knott, Shobha Venkataraman, Awni Hannun, Shubho Sengupta, Mark Ibrahim, Laurens van der Maaten | Published: 2021-09-02 | Updated: 2022-09-15
Membership Inference
Machine Learning Method
Computational Efficiency

Guarding Machine Learning Hardware Against Physical Side-Channel Attacks

Authors: Anuj Dubey, Rosario Cammarota, Vikram Suresh, Aydin Aysu | Published: 2021-09-01
Watermarking
Computational Efficiency
Defense Mechanism

OACAL: Finding Module-consistent Specifications to Secure Systems from Weakened User Obligations

Authors: Pengcheng Jiang, Kenji Tei | Published: 2021-08-16 | Updated: 2021-11-02
Algorithm
Module Reconfiguration
Computational Efficiency