Evaluation and Optimization of Distributed Machine Learning Techniques for Internet of Things Authors: Yansong Gao, Minki Kim, Chandra Thapa, Sharif Abuadbba, Zhi Zhang, Seyit A. Camtepe, Hyoungshick Kim, Surya Nepal | Published: 2021-03-03 Performance EvaluationDistributed LearningComputational Efficiency 2021.03.03 2025.05.28 Literature Database
Private Stochastic Convex Optimization: Optimal Rates in $\ell_1$ Geometry Authors: Hilal Asi, Vitaly Feldman, Tomer Koren, Kunal Talwar | Published: 2021-03-02 Privacy-Preserving AlgorithmConvergence AnalysisComputational Efficiency 2021.03.02 2025.05.28 Literature Database
SoK: On the Security Challenges and Risks of Multi-Tenant FPGAs in the Cloud Authors: Shaza Zeitouni, Ghada Dessouky, Ahmad-Reza Sadeghi | Published: 2020-09-29 | Updated: 2020-10-05 FPGA SecurityMalicious ClientComputational Efficiency 2020.09.29 2025.05.28 Literature Database
When Homomorphic Encryption Marries Secret Sharing: Secure Large-Scale Sparse Logistic Regression and Applications in Risk Control Authors: Chaochao Chen, Jun Zhou, Li Wang, Xibin Wu, Wenjing Fang, Jin Tan, Lei Wang, Alex X. Liu, Hao Wang, Cheng Hong | Published: 2020-08-20 | Updated: 2021-05-31 Secure Logistic RegressionComputational EfficiencyCommunication Efficiency 2020.08.20 2025.05.28 Literature Database
Revisiting Adversarially Learned Injection Attacks Against Recommender Systems Authors: Jiaxi Tang, Hongyi Wen, Ke Wang | Published: 2020-08-11 | Updated: 2020-08-28 Adversarial Attack MethodsOptimization ProblemComputational Efficiency 2020.08.11 2025.05.28 Literature Database
Towards Plausible Differentially Private ADMM Based Distributed Machine Learning Authors: Jiahao Ding, Jingyi Wang, Guannan Liang, Jinbo Bi, Miao Pan | Published: 2020-08-11 Privacy Protection MethodOptimization ProblemComputational Efficiency 2020.08.11 2025.05.28 Literature Database
Local Differential Privacy and Its Applications: A Comprehensive Survey Authors: Mengmeng Yang, Lingjuan Lyu, Jun Zhao, Tianqing Zhu, Kwok-Yan Lam | Published: 2020-08-09 Data Extraction and AnalysisPrivacy ManagementComputational Efficiency 2020.08.09 2025.05.28 Literature Database
TEAM: We Need More Powerful Adversarial Examples for DNNs Authors: Yaguan Qian, Ximin Zhang, Bin Wang, Wei Li, Zhaoquan Gu, Haijiang Wang, Wassim Swaileh | Published: 2020-07-31 | Updated: 2020-08-10 Attack MethodAdversarial ExampleComputational Efficiency 2020.07.31 2025.05.28 Literature Database
DeepPeep: Exploiting Design Ramifications to Decipher the Architecture of Compact DNNs Authors: Nandan Kumar Jha, Sparsh Mittal, Binod Kumar, Govardhan Mattela | Published: 2020-07-30 Performance EvaluationDeep LearningComputational Efficiency 2020.07.30 2025.05.28 Literature Database
Efficient Sparse Secure Aggregation for Federated Learning Authors: Constance Beguier, Mathieu Andreux, Eric W. Tramel | Published: 2020-07-29 | Updated: 2021-10-18 Security AnalysisPrivacy AssessmentComputational Efficiency 2020.07.29 2025.05.28 Literature Database