Blockchain-enabled Trustworthy Federated Unlearning Authors: Yijing Lin, Zhipeng Gao, Hongyang Du, Jinke Ren, Zhiqiang Xie, Dusit Niyato | Published: 2024-01-29 WatermarkingFederated LearningAdaptive Retraining Mechanism 2024.01.29 2025.05.27 Literature Database
Towards Adversarial Purification using Denoising AutoEncoders Authors: Dvij Kalaria, Aritra Hazra, Partha Pratim Chakrabarti | Published: 2022-08-29 DNN IP Protection MethodWatermarkingAdaptive Retraining Mechanism 2022.08.29 2025.05.28 Literature Database
Adaptive Hybrid Heterogeneous IDS for 6LoWPAN Authors: Aryan Mohammadi Pasikhani, John A Clark, Prosanta Gope | Published: 2022-05-18 Online Decision MakingAttack DetectionAdaptive Retraining Mechanism 2022.05.18 2025.05.28 Literature Database
Revisiting IoT Device Identification Authors: Roman Kolcun, Diana Andreea Popescu, Vadim Safronov, Poonam Yadav, Anna Maria Mandalari, Richard Mortier, Hamed Haddadi | Published: 2021-07-16 User Behavior AnalysisMachine Learning MethodAdaptive Retraining Mechanism 2021.07.16 2025.05.28 Literature Database
Prive-HD: Privacy-Preserved Hyperdimensional Computing Authors: Behnam Khaleghi, Mohsen Imani, Tajana Rosing | Published: 2020-05-14 Privacy LeakageComputational EfficiencyAdaptive Retraining Mechanism 2020.05.14 2025.05.28 Literature Database
Machine Unlearning Authors: Lucas Bourtoule, Varun Chandrasekaran, Christopher A. Choquette-Choo, Hengrui Jia, Adelin Travers, Baiwu Zhang, David Lie, Nicolas Papernot | Published: 2019-12-09 | Updated: 2020-12-15 Privacy ProtectionFundamentals of Machine LearningAdaptive Retraining Mechanism 2019.12.09 2025.05.28 Literature Database
The Curious Case of Machine Learning In Malware Detection Authors: Sherif Saad, William Briguglio, Haytham Elmiligi | Published: 2019-05-18 Malware Detection MethodInformation SecurityAdaptive Retraining Mechanism 2019.05.18 2025.05.28 Literature Database