An Efficient Gradient-Based Inference Attack for Federated Learning Authors: Pablo Montaña-Fernández, Ines Ortega-Fernandez | Published: 2025-12-17 Privacy AnalysisPerformance EvaluationFederated Learning 2025.12.17 2025.12.19 Literature Database
Secure and Privacy-Preserving Federated Learning for Next-Generation Underground Mine Safety Authors: Mohamed Elmahallawy, Sanjay Madria, Samuel Frimpong | Published: 2025-12-09 Privacy AssurancePrivacy AnalysisFederated Learning 2025.12.09 2025.12.11 Literature Database
Scaling Trust in Quantum Federated Learning: A Multi-Protocol Privacy Design Authors: Dev Gurung, Shiva Raj Pokhrel | Published: 2025-12-03 Privacy ProtectionDifferential PrivacyFederated Learning 2025.12.03 2025.12.05 Literature Database
Quantum Vanguard: Server Optimized Privacy Fortified Federated Intelligence for Future Vehicles Authors: Dev Gurung, Shiva Raj Pokhrel | Published: 2025-12-02 Privacy ProtectionFederated LearningQuantum Cryptanalysis 2025.12.02 2025.12.04 Literature Database
GUIDE: Enhancing Gradient Inversion Attacks in Federated Learning with Denoising Models Authors: Vincenzo Carletti, Pasquale Foggia, Carlo Mazzocca, Giuseppe Parrella, Mario Vento | Published: 2025-10-20 Privacy AnalysisReconstruction AttackFederated Learning 2025.10.20 2025.10.22 Literature Database
Fairness-Constrained Optimization Attack in Federated Learning Authors: Harsh Kasyap, Minghong Fang, Zhuqing Liu, Carsten Maple, Somanath Tripathy | Published: 2025-10-14 Trigger DetectionBiasFederated Learning 2025.10.14 2025.10.16 Literature Database
Federated Learning in the Wild: A Comparative Study for Cybersecurity under Non-IID and Unbalanced Settings Authors: Roberto Doriguzzi-Corin, Petr Sabel, Silvio Cretti, Silvio Ranise | Published: 2025-09-22 Client Selection MethodAdversarial LearningFederated Learning 2025.09.22 2025.09.24 Literature Database
Secure UAV-assisted Federated Learning: A Digital Twin-Driven Approach with Zero-Knowledge Proofs Authors: Md Bokhtiar Al Zami, Md Raihan Uddin, Dinh C. Nguyen | Published: 2025-09-17 Energy Managementデジタルツイン技術Federated Learning 2025.09.17 2025.09.19 Literature Database
Cyber Threat Hunting: Non-Parametric Mining of Attack Patterns from Cyber Threat Intelligence for Precise Threats Attribution Authors: Rimsha Kanwal, Umara Noor, Zafar Iqbal, Zahid Rashid | Published: 2025-09-15 Algorithm脅威モデリング自動化Federated Learning 2025.09.15 2025.09.17 Literature Database
Federated Learning: An approach with Hybrid Homomorphic Encryption Authors: Pedro Correia, Ivan Silva, Ivone Amorim, Eva Maia, Isabel Praça | Published: 2025-09-03 Integration of FL and HEPrivacy Design PrinciplesFederated Learning 2025.09.03 2025.09.05 Literature Database